Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems

被引:0
|
作者
Li, Chun-Ta [1 ]
Chen, Chin-Ling [2 ]
Lee, Cheng-Chi [3 ,4 ]
Chen, Chien-Ming [5 ]
机构
[1] Tainan Univ Technol, Dept Informat Management, 529 Zhongzheng Rd, Tainan 71002, Taiwan
[2] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, 168 Jifeng East Rd, Taichung 41349, Taiwan
[3] Fu Jen Catholic Univ, Dept Lib & Informat Sci, 510 Jhongjheng Rd, New Taipei 24205, Taiwan
[4] Asia Univ, Dept Photon & Commun Engn, 500 Lioufeng Rd, Taichung 41354, Taiwan
[5] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
关键词
Authentication; Biometric; Cryptanalysis; Elliptic curve cryptography; Password; Smart card; SMART CARDS;
D O I
10.1007/978-3-319-57186-7_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays users can access various online services and resources from distributed information systems remotely via Internet or other public networks. However, remote online systems are vulnerable to many security attacks due to they are built on public networks. Therefore it is necessary to design an authentication scheme for securing network communications between a login user and a remote server. In 2016, Han et al. proposed a secure three-factor authentication scheme based on elliptic curve cryptography (ECC) to achieve this goal. Unfortunately, we analyzed Han et al.'s scheme and demonstrated that their authentication scheme cannot satisfactory to be implemented in practice because it fails to ensure the property of unlinkability between the login user and the remote server and is unable to withstand account duplication attack. In this paper, we suggest an enhanced anonymous authentication scheme to repair the security flaws in Han et al.'s scheme. We give the security analysis and performance evaluation to demonstrate that the proposed scheme not only resists the aforementioned security weaknesses on Han et al.'s scheme but also inherits the functionality merits and performance efficiencies of their authentication scheme.
引用
收藏
页码:116 / 126
页数:11
相关论文
共 50 条
  • [11] A SECURE AND EFFICIENT AUTHENTICATION WITH KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Qu, Juan
    Feng, Yuming
    Huang, Yi
    [J]. ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2015, (34): : 101 - 112
  • [12] A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography
    Dai, Cong
    Xu, Zhongwei
    [J]. AD HOC NETWORKS, 2022, 127
  • [13] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna, Ch.
    Bharath Kalyan Reddy, D.
    Amritha, P.P.
    Lakshmy, K.V.
    Sachnev, Vasily
    [J]. International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193
  • [14] An Efficient and Secure Key Exchange Protocol Based on Elliptic Curve and Security Models
    Abusukhon, Ahmad
    Mohammad, Zeyad
    Al-Thaher, Ali
    [J]. 2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 73 - 78
  • [15] Secure authenticated key exchange protocol based on EC using signcryption scheme
    Kim, Rack-Hyun
    Youm, Heung-Youl
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 74 - +
  • [16] Cryptanalysis of a Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography
    Pu, Qiong
    Zhao, Xiuying
    Ding, Jianmin
    [J]. 2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 7 - 10
  • [17] A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
    Lim, Meng-Hui
    Yeoh, Chee-Min
    Lee, Sanggon
    Lim, Hyotaek
    Lee, Hoonjae
    [J]. NETWORKING 2008: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, 4982 : 170 - +
  • [18] Efficient and Secure Authenticated Key Exchange Using Weak Passwords
    Katz, Jonathan
    Ostrovsky, Rafail
    Yung, Moti
    [J]. JOURNAL OF THE ACM, 2009, 57 (01)
  • [19] A SECURE AND EFFICIENCY ID-BASED AUTHENTICATED KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM FOR MOBILE DEVICES
    Yoon, Eun-Jun
    Choi, Sung-Bae
    Yoo, Kee-Young
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (04): : 2637 - 2653
  • [20] BIOMETRIC BASED THREE-FACTOR MUTUAL AUTHENTICATION SCHEME FOR ELECTRONIC PAYMENT SYSTEM USING ELLIPTIC CURVE CRYPTOGRAPHY
    Malathi, D.
    Sasikaladevi, N.
    [J]. MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2020, : 39 - 60