User Anonymity. For schemes [6, 7, 12], the identity IDC of the client C is transferred by plaintext, so an attacker can easily obtain the identity of the client. Thus user anonymity cannot be protected.
Appears in 2 contracts
Sources: Remote User Authentication and Key Agreement Scheme, Authentication and Key Agreement Scheme