<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf23109</article-id><article-id pub-id-type="doi">10.15388/Informatica.2012.354</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>An Improvement of the User Identification and Key Agreement Protocol with User Anonymity</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Yoon</surname><given-names>Eun-Jun</given-names></name><email xlink:href="mailto:ejyoon@kiu.ac.kr">ejyoon@kiu.ac.kr</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Yoo</surname><given-names>Kee-Young</given-names></name><email xlink:href="mailto:yook@knu.ac.kr">yook@knu.ac.kr</email><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><aff id="j_INFORMATICA_aff_000">School of Computer Engineering, Kyungil University, 33 Buho-Ri, Hayang-Ub, Kyungsan-Si, Kyungsangpuk-Do 712-701, Republic of Korea</aff><aff id="j_INFORMATICA_aff_001">School of Computer Science and Engineering, College of IT Engineering Kyungpook National University, 1370 Sankyuk-dong, Buk-gu, Daegu 702-701, Republic of Korea</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2012</year></pub-date><volume>23</volume><issue>1</issue><fpage>155</fpage><lpage>172</lpage><history><date date-type="received"><day>01</day><month>07</month><year>2010</year></date><date date-type="accepted"><day>01</day><month>04</month><year>2011</year></date></history><abstract><p>User anonymity is very important security technique in distributed computing environments that an illegal entity cannot determine any information concerning the user's identity. In 2006, Kumar–Rajendra proposed a Secure Identification and Key agreement protocol with user Anonymity (SIKA). This paper demonstrates the vulnerability of the SIKA protocol and then presents an improvement to repair the security flaws of the SIKA protocol.</p></abstract><kwd-group><label>Keywords</label><kwd>cryptography</kwd><kwd>identification</kwd><kwd>key agreement</kwd><kwd>anonymity</kwd><kwd>security</kwd><kwd>unlinkability</kwd></kwd-group></article-meta></front></article>