An efficient multi-factor authenticated key exchange with physically unclonable function

被引:6
|
作者
Byun, Jin Wook [1 ]
机构
[1] Pyeongtaek Univ, Dept Informat & Commun, Pyeongtaek Si, South Korea
基金
新加坡国家研究基金会;
关键词
PUF; Authentication; Key exchange; Multi-factor authenticators;
D O I
10.23919/elinfocom.2019.8706400
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an efficient and secure physically unclonable function based multi-factor authenticated key exchange (PUF-MAKE). In a PUF-MAKE setting, we suppose two participants; a user and a server. The user keeps multi-factor authenticators and securely holds a PUF-embedded device while the server maintains PUF outputs for authentication. We first study on how to efficiently construct a PUF-MAKE protocol. The main difficulty comes from that it should establish a common key from both multi-factor authenticators and a PUF-embedded device. Our construction is the first secure PUF-MAKE protocol that just needs three communication flows.
引用
收藏
页码:477 / 480
页数:4
相关论文
共 50 条
  • [1] Multi-factor authenticated key exchange
    Pointcheval, David
    Zimmer, Sebastien
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 277 - 295
  • [2] Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
    Zhang, Rui
    Xiao, Yuting
    Sun, Shuzhou
    Ma, Hui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 625 - 634
  • [3] Cryptanalysis and Improvement of a Multi-factor Authenticated Key Exchange Protocol
    Ma, Zhiqiang
    He, Jun
    [J]. International Journal of Network Security, 2023, 25 (05) : 764 - 776
  • [4] Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol
    Ma, Zhiqiang
    He, Jun
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 320 - 337
  • [5] A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function
    Byun, Jin Wook
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [6] Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting
    Liu, Ying
    Wei, Fushan
    Ma, Chuangui
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 255 - 267
  • [7] Multi-factor Identity Authenticated Key Agreement Protocol
    Wang, Jun
    Chen, Yue
    Yang, Gang
    Jia, Hongyong
    Lan, Julong
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5597 - 5602
  • [8] Multi-Factor Password-Authenticated Key Exchange via Pythia PRF Service
    Li, Zengpeng
    Wang, Jiuru
    Choi, Chang
    Zhang, Wenyin
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 663 - 674
  • [9] A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing
    Wei, Fu-Shah
    Jiang, Qi
    Zhang, Rui-Jie
    Ma, Chuan-Gui
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (04) : 907 - 921
  • [10] MAKA: Provably Secure Multi-factor Authenticated Key Agreement Protocol
    Liu, Xiaoxue
    Li, Yanping
    Qu, Juan
    Jiang, Qi
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (03): : 669 - 677