An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card

被引:35
|
作者
Odelu, Vanga [1 ]
Das, Ashok Kumar [2 ]
Goswami, Adrijit [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
关键词
Security; User anonymity; Mutual authentication; Client-server network; Mobile device;
D O I
10.1016/j.jisa.2015.01.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authentication protocols are trusted components in a communication system in order to protect sensitive information against a malicious adversary in the client-server environment by means of providing a variety of services including users' privacy and authentication. In the cryptographic protocols, understanding the security failures is the key for both patching to the existing protocols and designing the future protocols. Recently, in 2014, Wang proposed an improved Elliptic Curve Cryptography (ECC) based anonymous remote authentication scheme using smart card and claimed that the proposed scheme is secure against password guessing attack, smart card lost/stolen verifier attack, and also preserves user anonymity and prevents credential leakage. However, in this paper, we show that Wang's scheme fails to preserve the user anonymity and does not prevent the off-line password guessing attack, credential leakage and smart card lost/stolen verifier attack. In order to withstand those security pitfalls found in Wang's scheme, we aim to propose a new secure privacy-preserving ECC-based client authentication with key agreement protocol using smart card. Through the formal and informal security analysis we show that our scheme is secure against possible known attacks including the off-line password guessing attack, credential leakage attack and smart card lost/stolen verifier attack. Our scheme also preserves the user anonymity property. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks. Our scheme provides high security along with low computational and communication costs. As a result, our scheme is practically suitable for mobile devices in the client-server environment as compared to other related schemes in the literature. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 50 条
  • [31] Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
    Batina, Lejla
    Lee, Yong Ki
    Seys, Stefaan
    Singelee, Dave
    Verbauwhede, Ingrid
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (03) : 323 - 335
  • [32] Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card
    Mishra, Dheerendra
    Dhal, Subhasish
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (01) : 1 - 21
  • [33] A secure and privacy-preserving key agreement and mutual authentication scheme
    Li, Hui
    Jing, Tao
    Qian, Jin
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2020, 34 (04) : 201 - 213
  • [34] Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card
    Dheerendra Mishra
    Subhasish Dhal
    [J]. Wireless Personal Communications, 2018, 99 : 1 - 21
  • [35] RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications
    Safkhani, Masoumeh
    Bagheri, Nasour
    Kumari, Saru
    Tavakoli, Hamidreza
    Kumar, Sachin
    Chen, Jiahui
    [J]. IEEE ACCESS, 2020, 8 : 200851 - 200862
  • [36] A Privacy-Preserving Authentication and Key Agreement Scheme with Deniability for IoT
    Zhou, Yousheng
    Liu, Tong
    Tang, Fei
    Wang, Feng
    Tinashe, Magara
    [J]. ELECTRONICS, 2019, 8 (04):
  • [37] A Location Privacy-Preserving Protocol Based on Homomorphic Encryption and Key Agreement
    Zhu, Xiaoling
    Lu, Yang
    Zhu, Xiaojuan
    Qiu, Shuwei
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 54 - 59
  • [38] Lightweight Privacy-Preserving Remote User Authentication and Key Agreement Protocol for Next-Generation IoT-Based Smart Healthcare
    Ashraf, Zeeshan
    Mahmood, Zahid
    Iqbal, Muddesar
    [J]. FUTURE INTERNET, 2023, 15 (12)
  • [39] Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT
    Hu, Shunfang
    Jiang, Shaoping
    Miao, Qing
    Yang, Fan
    Zhou, Weihong
    Duan, Peng
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (08):
  • [40] A Privacy-Preserving Authenticated Key Agreement Protocol with Smart Cards for Mobile hmergency Services
    Fan, Ya-Jun
    Qiu, Xue-Song
    Wen, Qiao-Yan
    [J]. 2017 IEEE 21ST INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2017, : 227 - 232