In 2009, Chang et al. also pointed out that Wu et al’sscheme exists two weaknesses, which failed toachieve the anonymity and prevent impersonationattack. At the same time, they also proposed theimproved scheme to overcome these weaknesses.However, it’s unfortunately, their proposed scheme stillnot efficiently overcome these weaknesses.
In this paper, we will analyze Wu et al.’s scheme andpropose a secure anonymous authentication scheme toimprove the security weaknesses in Wu at al.’s scheme.