A Note on "Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services"

Zhengjun Cao
DOI: https://doi.org/10.1007/s11277-024-10881-2
IF: 2.017
2024-02-27
Wireless Personal Communications
Abstract:We show that the Kumari-Renuka key agreement scheme (Wirel Pers Commun 117:27–45, 2021) fails to keep user anonymity, not as claimed, because an adversary can retrieve the user's identity from the pseudonym . The loss of anonymity originates from the misuse of bitwise operator, which requires that both operands have an equal bit-length, otherwise the partial string in the long operand will be exposed. We also suggest a remedy method to fix the flaw by using a hash function to convert a point over the underlying elliptic curve into a random string with fixed length.
telecommunications
What problem does this paper attempt to address?