Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Security analysis of a user registration approach

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Recently, Shi and Zhong (J Supercomput. doi:10.1007/s11227-015-1496-7, 2015) proposed an efficient user registration approach to overcome security weakness in previous approaches. They claimed that their approach is secure against various attacks. However, in this paper, we point out that their approach is vulnerable to the impersonation attack, i.e., a legal user can impersonate another user to the server. The analysis shows that their approach cannot overcome security weakness in previous approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Chou CH, Tsai KY, Lu CF (2013) Two ID-based authenticated schemes with key agreement for mobile environments. J Supercomput 66(2):973–988

    Article  Google Scholar 

  2. Farash MS, Attari MA (2014) A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks. J Supercomput 69(1):395–411

    Article  MathSciNet  Google Scholar 

  3. Shi RH, Zhong H (2015) Comments on two schemes of identity-based user authentication and key agreement for mobile client–server networks. J Supercomput. doi:10.1007/s11227-015-1496-7

Download references

Acknowledgments

We thank the editors and the anonymous reviewers for their useful comments and suggestions which helped us improve the quality and presentation of this paper. The work of M. Luo was supported by the National Natural Science Foundation of China (Nos. 61402339, 61572370). The work of D. He was supported by the National Natural Science Foundation of China (Nos. 61572379, 61501333), the Natural Science Foundation of Hubei Province of China (No. 2015CFB257), the Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) and the Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Shen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, M., Zhang, J., He, D. et al. Security analysis of a user registration approach. J Supercomput 72, 900–903 (2016). https://doi.org/10.1007/s11227-015-1619-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-015-1619-1

Keywords