JOURNAL ARTICLE

On the security of a dynamic identity‐based remote user authentication scheme with verifiable password update

Yongchun LiuPeng GongXiaopeng YanPing Li

Year: 2013 Journal:   International Journal of Communication Systems Vol: 28 (5)Pages: 842-847   Publisher: Wiley

Abstract

Summary Recently, Chang et al . [Chang Y, Tai W, Chang H. Untraceable dynamic identity‐based remote user authentication scheme with verifiable password update. International Journal of Communication Systems 2013; doi:10.1002/dac.2552] proposed a dynamic identity‐based remote user authentication scheme with verifiable password update. They also proved that their scheme could withstand various attacks. Unfortunately, by proposing concrete attacks, we show that their scheme is vulnerable to three kinds of attacks. We also point out that their scheme cannot provide untraceability. The analysis shows that the scheme of Chang et al . is not suitable for practical applications. Copyright © 2013 John Wiley & Sons, Ltd.

Keywords:
Verifiable secret sharing Password Computer science Scheme (mathematics) Computer security Authentication (law) One-time password Security analysis Identity (music) Password strength Password cracking Computer network

Metrics

7
Cited By
1.45
FWCI (Field Weighted Citation Impact)
28
Refs
0.83
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

© 2026 ScienceGate Book Chapters — All rights reserved.