We found a match
Your institution may have rights to this item. Sign in to continue.
- Title
Security analysis of a user registration approach.
- Authors
Luo, Min; Zhang, Jingyin; He, Debiao; Shen, Jian
- Abstract
Recently, Shi and Zhong (J Supercomput. doi:, ) proposed an efficient user registration approach to overcome security weakness in previous approaches. They claimed that their approach is secure against various attacks. However, in this paper, we point out that their approach is vulnerable to the impersonation attack, i.e., a legal user can impersonate another user to the server. The analysis shows that their approach cannot overcome security weakness in previous approaches.
- Subjects
COMPUTER security; COMPUTER access control; ELLIPTIC curve cryptography; KEY agreement protocols (Computer network protocols); COMPUTER algorithms
- Publication
Journal of Supercomputing, 2016, Vol 72, Issue 3, p900
- ISSN
0920-8542
- Publication type
Article
- DOI
10.1007/s11227-015-1619-1