An Improvement of the User Identification and Key Agreement Protocol with User Anonymity
Volume 23, Issue 1 (2012), pp. 155–172
Pub. online: 1 January 2012
Type: Research Article
Received
1 July 2010
1 July 2010
Accepted
1 April 2011
1 April 2011
Published
1 January 2012
1 January 2012
Abstract
User anonymity is very important security technique in distributed computing environments that an illegal entity cannot determine any information concerning the user's identity. In 2006, Kumar–Rajendra proposed a Secure Identification and Key agreement protocol with user Anonymity (SIKA). This paper demonstrates the vulnerability of the SIKA protocol and then presents an improvement to repair the security flaws of the SIKA protocol.