Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems

被引:0
|
作者
Li, Chun-Ta [1 ]
Chen, Chin-Ling [2 ]
Lee, Cheng-Chi [3 ,4 ]
Chen, Chien-Ming [5 ]
机构
[1] Tainan Univ Technol, Dept Informat Management, 529 Zhongzheng Rd, Tainan 71002, Taiwan
[2] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, 168 Jifeng East Rd, Taichung 41349, Taiwan
[3] Fu Jen Catholic Univ, Dept Lib & Informat Sci, 510 Jhongjheng Rd, New Taipei 24205, Taiwan
[4] Asia Univ, Dept Photon & Commun Engn, 500 Lioufeng Rd, Taichung 41354, Taiwan
[5] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
关键词
Authentication; Biometric; Cryptanalysis; Elliptic curve cryptography; Password; Smart card; SMART CARDS;
D O I
10.1007/978-3-319-57186-7_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays users can access various online services and resources from distributed information systems remotely via Internet or other public networks. However, remote online systems are vulnerable to many security attacks due to they are built on public networks. Therefore it is necessary to design an authentication scheme for securing network communications between a login user and a remote server. In 2016, Han et al. proposed a secure three-factor authentication scheme based on elliptic curve cryptography (ECC) to achieve this goal. Unfortunately, we analyzed Han et al.'s scheme and demonstrated that their authentication scheme cannot satisfactory to be implemented in practice because it fails to ensure the property of unlinkability between the login user and the remote server and is unable to withstand account duplication attack. In this paper, we suggest an enhanced anonymous authentication scheme to repair the security flaws in Han et al.'s scheme. We give the security analysis and performance evaluation to demonstrate that the proposed scheme not only resists the aforementioned security weaknesses on Han et al.'s scheme but also inherits the functionality merits and performance efficiencies of their authentication scheme.
引用
收藏
页码:116 / 126
页数:11
相关论文
共 50 条
  • [31] A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Sher, Muhammad
    [J]. ELECTRONIC COMMERCE RESEARCH, 2016, 16 (01) : 113 - 139
  • [32] Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 1983 - 2001
  • [33] An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures
    Meshram, Chandrashekhar
    Imoize, Agbotiname Lucky
    Jamal, Sajjad Shaukat
    Tambare, Parkash
    Alharbi, Adel R.
    Hussain, Iqtadar
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1373 - 1389
  • [34] An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures
    Meshram, Chandrashekhar
    Imoize, Agbotiname Lucky
    Jamal, Sajjad Shaukat
    Tambare, Parkash
    Alharbi, Adel R.
    Hussain, Iqtadar
    [J]. Computers, Materials and Continua, 2022, 72 (01): : 1373 - 1389
  • [35] A efficient (t,n) threshold proxy signature scheme based on elliptic curve cryptosystems
    Lu, Dianjun
    Zhang, Bingru
    Wang, Yun
    Li, Xinyan
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4586 - +
  • [36] A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
    Sammoud, Amal
    Chalouf, Mohamed Aymen
    Hamdi, Omessaad
    Montavont, Nicolas
    Bouallegue, Ammar
    [J]. 2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1916 - 1921
  • [37] Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme
    Zhang, Liping
    Zhu, Shaohui
    Tang, Shanyu
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2017, 21 (02) : 465 - 475
  • [38] Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
    Zhang, Rui
    Xiao, Yuting
    Sun, Shuzhou
    Ma, Hui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 625 - 634
  • [39] An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography
    Tan, Zuowen
    [J]. Journal of Convergence Information Technology, 2010, 5 (04)
  • [40] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho CHOU
    Kuo-yu TSAI
    Tzong-chen WU
    Kuo-hui YEH
    [J]. Frontiers of Information Technology & Electronic Engineering, 2013, 14 (05) : 347 - 355