Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems

被引:0
|
作者
Li, Chun-Ta [1 ]
Chen, Chin-Ling [2 ]
Lee, Cheng-Chi [3 ,4 ]
Chen, Chien-Ming [5 ]
机构
[1] Tainan Univ Technol, Dept Informat Management, 529 Zhongzheng Rd, Tainan 71002, Taiwan
[2] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, 168 Jifeng East Rd, Taichung 41349, Taiwan
[3] Fu Jen Catholic Univ, Dept Lib & Informat Sci, 510 Jhongjheng Rd, New Taipei 24205, Taiwan
[4] Asia Univ, Dept Photon & Commun Engn, 500 Lioufeng Rd, Taichung 41354, Taiwan
[5] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
关键词
Authentication; Biometric; Cryptanalysis; Elliptic curve cryptography; Password; Smart card; SMART CARDS;
D O I
10.1007/978-3-319-57186-7_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays users can access various online services and resources from distributed information systems remotely via Internet or other public networks. However, remote online systems are vulnerable to many security attacks due to they are built on public networks. Therefore it is necessary to design an authentication scheme for securing network communications between a login user and a remote server. In 2016, Han et al. proposed a secure three-factor authentication scheme based on elliptic curve cryptography (ECC) to achieve this goal. Unfortunately, we analyzed Han et al.'s scheme and demonstrated that their authentication scheme cannot satisfactory to be implemented in practice because it fails to ensure the property of unlinkability between the login user and the remote server and is unable to withstand account duplication attack. In this paper, we suggest an enhanced anonymous authentication scheme to repair the security flaws in Han et al.'s scheme. We give the security analysis and performance evaluation to demonstrate that the proposed scheme not only resists the aforementioned security weaknesses on Han et al.'s scheme but also inherits the functionality merits and performance efficiencies of their authentication scheme.
引用
收藏
页码:116 / 126
页数:11
相关论文
共 50 条
  • [1] An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems
    Lidong Han
    Xiao Tan
    Shengbao Wang
    Xikun Liang
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 63 - 73
  • [2] An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems
    Han, Lidong
    Tan, Xiao
    Wang, Shengbao
    Liang, Xikun
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (01) : 63 - 73
  • [3] A three-party authenticated key exchange scheme smartcard using elliptic curve cryptosystem for secure key exchange in wireless sensor network
    Yang, Jongwon
    Seo, Changho
    Cho, Jinman
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 339 - +
  • [4] A Secure Three-Factor Remote User Authentication Scheme Using Elliptic Curve Cryptosystem
    Ali, Rifaqat
    Pal, Arup Kumar
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMPUTING & COMMUNICATION SYSTEMS, MCCS 2015, 2018, 453 : 9 - 24
  • [5] AN EFFICIENT AND SECURE THREE-PASS AUTHENTICATED KEY AGREEMENT ELLIPTIC CURVE BASED PROTOCOL
    Mohammad, Zeyad
    Hsu, Chien-Lung
    Chen, Yaw-Chung
    Lo, Chi-Chun
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1273 - 1284
  • [6] A Secure Three-Factor Authenticated Key Agreement Scheme for Multi-Server Environment
    Xia, Meichen
    Li, Shiliang
    Liu, Liu
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (03): : 1673 - 1689
  • [7] A secure and efficient authenticated key exchange scheme for smart grid
    Xia, Zhe
    Liu, Tao
    Wang, Jingjing
    Chen, Shi
    [J]. HELIYON, 2023, 9 (07)
  • [8] Signature-based three-factor authenticated key exchange for internet of things applications
    Jia, Xiaoying
    He, Debiao
    Li, Li
    Choo, Kim-Kwang Raymond
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18355 - 18382
  • [9] Signature-based three-factor authenticated key exchange for internet of things applications
    Xiaoying Jia
    Debiao He
    Li Li
    Kim-Kwang Raymond Choo
    [J]. Multimedia Tools and Applications, 2018, 77 : 18355 - 18382
  • [10] Elliptic curve based password authenticated key exchange protocols
    Boyd, C
    Montague, P
    Nguyen, K
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 487 - 501