An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card

被引:35
|
作者
Odelu, Vanga [1 ]
Das, Ashok Kumar [2 ]
Goswami, Adrijit [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
关键词
Security; User anonymity; Mutual authentication; Client-server network; Mobile device;
D O I
10.1016/j.jisa.2015.01.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authentication protocols are trusted components in a communication system in order to protect sensitive information against a malicious adversary in the client-server environment by means of providing a variety of services including users' privacy and authentication. In the cryptographic protocols, understanding the security failures is the key for both patching to the existing protocols and designing the future protocols. Recently, in 2014, Wang proposed an improved Elliptic Curve Cryptography (ECC) based anonymous remote authentication scheme using smart card and claimed that the proposed scheme is secure against password guessing attack, smart card lost/stolen verifier attack, and also preserves user anonymity and prevents credential leakage. However, in this paper, we show that Wang's scheme fails to preserve the user anonymity and does not prevent the off-line password guessing attack, credential leakage and smart card lost/stolen verifier attack. In order to withstand those security pitfalls found in Wang's scheme, we aim to propose a new secure privacy-preserving ECC-based client authentication with key agreement protocol using smart card. Through the formal and informal security analysis we show that our scheme is secure against possible known attacks including the off-line password guessing attack, credential leakage attack and smart card lost/stolen verifier attack. Our scheme also preserves the user anonymity property. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks. Our scheme provides high security along with low computational and communication costs. As a result, our scheme is practically suitable for mobile devices in the client-server environment as compared to other related schemes in the literature. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 50 条
  • [1] A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
    Mishra, Dheerendra
    Das, Ashok Kumar
    Mukhopadhyay, Sourav
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (01) : 171 - 192
  • [2] A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
    Dheerendra Mishra
    Ashok Kumar Das
    Sourav Mukhopadhyay
    [J]. Peer-to-Peer Networking and Applications, 2016, 9 : 171 - 192
  • [3] A new ECC-based wireless authentication and key agreement protocol
    Zhang, Juan
    Chen, Guanghui
    Deng, Fangmin
    [J]. FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1219 - 1225
  • [4] An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4136 - 4156
  • [5] An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities
    Xia, Xueya
    Ji, Sai
    Vijayakumar, Pandi
    Shen, Jian
    Rodrigues, Joel J. P. C.
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (06)
  • [6] A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card
    Li, Xiaowei
    Zhang, Yuqing
    Liu, Xuefeng
    Cao, Jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (05): : 1313 - 1327
  • [7] An efficient and certificateless conditional privacy-preserving authentication and key agreement scheme for smart healthcare
    Hu, Yihao
    Huang, Chunguang
    Cheng, Hai
    [J]. COMPUTER COMMUNICATIONS, 2024, 219 : 29 - 41
  • [8] A privacy-preserving biometrics based authenticated key agreement scheme using ECC
    Qi, Mingping
    Chen, Jianhua
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (11)
  • [9] New ECC-Based Remote User Authentication Scheme with Key Agreement Using Smart Cards
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (04): : 601 - 608
  • [10] A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing
    Shukla, Shivangi
    Patel, Sankita J.
    [J]. COMPUTING, 2022, 104 (05) : 1173 - 1202