A Secure Identification and Key agreement protocol with user Anonymity (SIKA)

@article{Mangipudi2006ASI,
  title={A Secure Identification and Key agreement protocol with user Anonymity (SIKA)},
  author={Kumar V. Mangipudi and Rajendra S. Katti},
  journal={Computers & Security},
  year={2006},
  volume={25},
  pages={420-425}
}
Anonymity is a desirable security feature in addition to providing user identification and key agreement during a user’s login process. Recently, Yang et al., proposed an efficient user identification and key distribution protocol while preserving user anonymity. Their protocol addresses a weakness in the protocol proposed by Wu and Hsu. Unfortunately, Yang’s protocol poses a vulnerability that can be exploited to launch a Denial-of-Service (DoS) attack. In this paper, we cryptanalyze Yang’s… CONTINUE READING
Highly Influential
This paper has highly influenced 12 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 365 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 40 extracted citations

365 Citations

050100150'09'12'15'18
Citations per Year
Semantic Scholar estimates that this publication has 365 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 14 references

technology-open systems interconnection-the directory: authentication framework

  • J Katz, R Ostrovsky, M. Yung
  • Proceedings of Eurocrypt’01
  • 2001
1 Excerpt

User identification and key distribution maintaining anonymity for distributed computer network

  • WB Lee, CC Chang
  • Comput Syst Sci Eng
  • 2000

Similar Papers

Loading similar papers…