文摘
Recently, Shi and Zhong (J Supercomput. doi:10.1007/s11227-015-1496-7, 2015) proposed an efficient user registration approach to overcome security weakness in previous approaches. They claimed that their approach is secure against various attacks. However, in this paper, we point out that their approach is vulnerable to the impersonation attack, i.e., a legal user can impersonate another user to the server. The analysis shows that their approach cannot overcome security weakness in previous approaches.