Improvement of a security enhanced one-time two-factor authentication and key agreement scheme

被引:14
|
作者
Xie, Qi [1 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Engn, Hangzhou 310036, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Key exchange; Password; Smart card; One-time; Two-factor; REMOTE MUTUAL AUTHENTICATION; PASSWORD AUTHENTICATION; EFFICIENT; WEAKNESSES;
D O I
10.1016/j.scient.2012.02.029
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In 2010, Holbl et al. showed that Shieh et al.'s mutual authentication and key agreement scheme is vulnerable to the smart card lost attack, not achieving perfect forward secrecy, and proposed a security enhanced scheme to eliminate these weaknesses. In this paper, we show that Holbl et al.'s security enhancement is still vulnerable to the smart card lost attacks. In addition, their scheme cannot resist impersonation attacks and parallel session attacks. Seeing that the existing mutual authentication schemes using smart cards are almost vulnerable to the smart card lost attacks, we further propose a new one-time two-factor mutual authentication and key agreement scheme to eliminate these weaknesses. (C) 2012 Sharif University of Technology. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:1856 / 1860
页数:5
相关论文
共 50 条
  • [31] Two-Factor Authentication and Key Agreement Schemes for Smart Home Fingerprint Characteristics
    Liu, Zhenpeng
    Li, Zeyuan
    Zhang, Qingwen
    Dong, Shuhui
    Liu, Jiahang
    Zhao, Yonggang
    Mobile Information Systems, 2022, 2022
  • [32] Improvement of security scheme in telemedicine by a new method of authentication applying one-time password with question/answer
    Haneda, K
    Koyama, T
    Umeda, T
    Harauchi, H
    Inamura, K
    CARS 2000: COMPUTER ASSISTED RADIOLOGY AND SURGERY, 2000, 1214 : 1031 - 1031
  • [33] Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city
    Xie, Qi
    Hwang, Lingfeng
    NEUROCOMPUTING, 2019, 347 : 131 - 138
  • [34] An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
    He, Daojing
    Gao, Yi
    Chan, Sammy
    Chen, Chun
    Bu, Jiajun
    AD HOC & SENSOR WIRELESS NETWORKS, 2010, 10 (04) : 361 - 371
  • [35] A two-factor security authentication scheme for wireless sensor networks in IoT environments
    Hu, Bin
    Tang, Wen
    Xie, Qi
    NEUROCOMPUTING, 2022, 500 : 741 - 749
  • [36] Cryptocurrencies with Security Policies and Two-Factor Authentication
    Breuer, Florian
    Goyal, Vipul
    Malavolta, Giulio
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 140 - 158
  • [37] A Usable and Secure Two-Factor Authentication Scheme
    Akram, Syed
    Misbahuddin, Mohammed
    Varaprasad, G.
    INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 169 - 182
  • [38] Masquerade on one-time password authentication scheme
    Lin, Chun-Li
    Hung, Ching-Po
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 278 - 282
  • [39] An Improved One-time Password Authentication Scheme
    Liu, Huiyi
    Zhang, Yuegong
    2013 15TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2013, : 1 - 5
  • [40] Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
    Wang, Ding
    Wang, Ping
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 708 - 722