An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card

被引:35
|
作者
Odelu, Vanga [1 ]
Das, Ashok Kumar [2 ]
Goswami, Adrijit [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
关键词
Security; User anonymity; Mutual authentication; Client-server network; Mobile device;
D O I
10.1016/j.jisa.2015.01.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authentication protocols are trusted components in a communication system in order to protect sensitive information against a malicious adversary in the client-server environment by means of providing a variety of services including users' privacy and authentication. In the cryptographic protocols, understanding the security failures is the key for both patching to the existing protocols and designing the future protocols. Recently, in 2014, Wang proposed an improved Elliptic Curve Cryptography (ECC) based anonymous remote authentication scheme using smart card and claimed that the proposed scheme is secure against password guessing attack, smart card lost/stolen verifier attack, and also preserves user anonymity and prevents credential leakage. However, in this paper, we show that Wang's scheme fails to preserve the user anonymity and does not prevent the off-line password guessing attack, credential leakage and smart card lost/stolen verifier attack. In order to withstand those security pitfalls found in Wang's scheme, we aim to propose a new secure privacy-preserving ECC-based client authentication with key agreement protocol using smart card. Through the formal and informal security analysis we show that our scheme is secure against possible known attacks including the off-line password guessing attack, credential leakage attack and smart card lost/stolen verifier attack. Our scheme also preserves the user anonymity property. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks. Our scheme provides high security along with low computational and communication costs. As a result, our scheme is practically suitable for mobile devices in the client-server environment as compared to other related schemes in the literature. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 50 条
  • [41] Privacy-Preserving Cancelable Biometric Authentication Based on RDM and ECC
    Wu, Lei
    Meng, Lingzhen
    Zhao, Shengnan
    Wei, Xia
    Wang, Hao
    [J]. IEEE ACCESS, 2021, 9 : 90989 - 91000
  • [42] Privacy-Preserving Cancelable Biometric Authentication Based on RDM and ECC
    Wu, Lei
    Meng, Lingzhen
    Zhao, Shengnan
    Wei, Xia
    Wang, Hao
    [J]. IEEE Access, 2021, 9 : 90989 - 91000
  • [43] Conditional Privacy-Preserving Authentication Scheme for IoV Based on ECC
    Xie, Peng-Shou
    Pan, Xiao-Jie
    Wang, Hong
    Wang, Jia-Lu
    Feng, Tao
    Yan, Yan
    [J]. International Journal of Network Security, 2022, 24 (03) : 501 - 510
  • [44] Provably Secure ECC-Based Authentication and Key Agreement Scheme for Advanced Metering Infrastructure in the Smart Grid
    Hu, Shunfang
    Chen, Yanru
    Zheng, Yilong
    Xing, Bin
    Li, Yang
    Zhang, Le
    Chen, Liangyin
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (04) : 5985 - 5994
  • [45] An Efficient Three-Factor Privacy-Preserving Authentication and Key Agreement Protocol for Vehicular Ad-Hoc Network
    Xu, Tao
    Xu, Cheng
    Xu, Zisang
    [J]. CHINA COMMUNICATIONS, 2021, 18 (12) : 315 - 331
  • [46] An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing
    Ji, Sai
    Yuan, Yang
    Shen, Jian
    Lai, Chin-Feng
    Chen, Bofan
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (03): : 437 - 448
  • [47] An Efficient Three-Factor Privacy-Preserving Authentication and Key Agreement Protocol for Vehicular Ad-Hoc Network
    Tao Xu
    Cheng Xu
    Zisang Xu
    [J]. China Communications, 2021, 18 (12) : 315 - 331
  • [48] A Lightweight ECC-based Three-Factor Mutual Authentication and Key Agreement Protocol for WSNs in IoT
    Fariss, Meriam
    El Gafif, Hassan
    Toumanari, Ahmed
    [J]. International Journal of Advanced Computer Science and Applications, 2022, 13 (06): : 491 - 501
  • [49] Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V
    Yu, Sixian
    Cao, Qiang
    Wang, Chenyu
    Xu, Guoai
    Ma, Huanhuan
    Zhu, Yucheng
    Peng, Yihang
    Jia, Yan
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (11) : 15028 - 15039
  • [50] ECC-Based Authenticated Key Agreement Protocol for Industrial Control System
    Chen, Yanru
    Yin, Fengming
    Hu, Shunfang
    Sun, Limin
    Li, Yang
    Xing, Bin
    Chen, Liangyin
    Guo, Bing
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (06) : 4688 - 4697