关于“使用智能卡的分布式系统的高效和安全的动态基于id的远程用户认证方案”的评论

Goutham Reddy Alavalapati, Eunjun Yoon, K. Yoo
{"title":"关于“使用智能卡的分布式系统的高效和安全的动态基于id的远程用户认证方案”的评论","authors":"Goutham Reddy Alavalapati, Eunjun Yoon, K. Yoo","doi":"10.1049/iet-ifs.2016.0218","DOIUrl":null,"url":null,"abstract":"This comment paper refers to an article published by Leu and Hsieh in IET Information Security in the year 2014. Leu and Hsieh proposed a remote user authentication protocol for distributed systems using smartcard. Their protocol affords user anonymity and no verification tables at either end, which can decrease the storage space along with the computations. Their protocol can resist security attacks and is efficient compared with few relevant protocols in terms of computational cost. However, this comment paper brings questions about the correctness of the design of Leu and Hsieh's protocol.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"71 1","pages":"220-221"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards'\",\"authors\":\"Goutham Reddy Alavalapati, Eunjun Yoon, K. Yoo\",\"doi\":\"10.1049/iet-ifs.2016.0218\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This comment paper refers to an article published by Leu and Hsieh in IET Information Security in the year 2014. Leu and Hsieh proposed a remote user authentication protocol for distributed systems using smartcard. Their protocol affords user anonymity and no verification tables at either end, which can decrease the storage space along with the computations. Their protocol can resist security attacks and is efficient compared with few relevant protocols in terms of computational cost. However, this comment paper brings questions about the correctness of the design of Leu and Hsieh's protocol.\",\"PeriodicalId\":13305,\"journal\":{\"name\":\"IET Inf. Secur.\",\"volume\":\"71 1\",\"pages\":\"220-221\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Inf. Secur.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/iet-ifs.2016.0218\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Inf. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/iet-ifs.2016.0218","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

此评论文件引用Leu和Hsieh于2014年在IET信息安全上发表的一篇文章。Leu和Hsieh提出了一种基于智能卡的分布式系统远程用户认证协议。他们的协议提供了用户匿名性,并且在两端都没有验证表,这可以减少存储空间和计算。他们的协议可以抵抗安全攻击,并且在计算成本方面与其他相关协议相比效率更高。然而,这篇评论文章对Leu和Hsieh协议设计的正确性提出了质疑。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards'
This comment paper refers to an article published by Leu and Hsieh in IET Information Security in the year 2014. Leu and Hsieh proposed a remote user authentication protocol for distributed systems using smartcard. Their protocol affords user anonymity and no verification tables at either end, which can decrease the storage space along with the computations. Their protocol can resist security attacks and is efficient compared with few relevant protocols in terms of computational cost. However, this comment paper brings questions about the correctness of the design of Leu and Hsieh's protocol.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1 Improved Lattice-Based Mix-Nets for Electronic Voting Adaptive and survivable trust management for Internet of Things systems Comment on 'Targeted Ciphers for Format-Preserving Encryption' from Selected Areas in Cryptography 2018 Time-specific encrypted range query with minimum leakage disclosure
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1