Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision

被引:21
|
作者
Abbasinezhad-Mood, Dariush [1 ]
Mazinani, Sayyed Majid [1 ]
Nikooghadam, Morteza [1 ]
Ostad-Sharif, Arezou [1 ]
机构
[1] Imam Reza Int Univ, Dept Comp Engn, Mashhad 55391735, Razavi Khorasan, Iran
关键词
Protocols; Smart cards; Authentication; Servers; Encryption; Password; Anonymity; dynamic ID-based authenticated key agreement (DIDAKA); ProVerif; random oracle; REMOTE USER AUTHENTICATION; EXCHANGE PROTOCOL; SMART-CARD; CRYPTANALYSIS;
D O I
10.1109/TDSC.2020.3024654
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Providing security and privacy in today's digital era is very crucial. In order to ensure that the sensitive user data can only be accessed by a valid server, the user and server should agree on a common key in advance. To do so, in the last decade, a number of dynamic ID-based authenticated key agreement (DIDAKA) protocols have been proposed, which can guarantee subsequent secure communications of users and servers. Nevertheless, investigating the related works indicates that the existing DIDAKA schemes suffer from one or more security challenges. Quite recently, Xie et al. have presented an interesting anonymous DIDAKA protocol to cover the security weaknesses of previous schemes; nonetheless, we found that their scheme is susceptible to three attacks. Therefore, to remedy the security limitations, in this article, we propose a security-enhanced anonymous DIDAKA protocol, which not only keeps the merits of Xie et al.'s scheme, but also offers better execution time compared to their proposed one. To demonstrate the security of the proposed scheme, we present both formal security proof and automatic formal verification of security and to show its efficiency, we present an extensive comparative performance analysis. In conclusion, the results are indicative of the priority of the proposed scheme.
引用
收藏
页码:1227 / 1238
页数:12
相关论文
共 50 条
  • [41] Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement
    An, Young-Hwa
    [J]. 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1072 - 1076
  • [42] Provably secure authenticated tree based group key agreement
    Dutta, R
    Barua, R
    Sarkar, P
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 92 - 104
  • [43] Provably secure and efficient certificateless authenticated tripartite key agreement protocol
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1213 - 1221
  • [44] A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles
    田海博
    Willy Susilo
    明洋
    王育民
    [J]. Journal of Computer Science & Technology, 2008, (05) : 832 - 842
  • [45] A provable secure ID-based explicit authenticated key agreement protocol without random oracles
    Tian, Hai-Bo
    Susilo, Willy
    Ming, Yang
    Wang, Yu-Min
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2008, 23 (05) : 832 - 842
  • [46] A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles
    Hai-Bo Tian
    Willy Susilo
    Yang Ming
    Yu-Min Wang
    [J]. Journal of Computer Science and Technology, 2008, 23 : 832 - 842
  • [47] Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment
    Kim, S
    Lee, H
    Oh, H
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 323 - 335
  • [48] An Efficient ID-Based Authenticated Key Exchange Protocol
    Hu, Xuexian
    Liu, Wenfen
    Zhang, Jianhui
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 229 - +
  • [49] An Efficient and Secure, ID-based Authenticated, Asymmetric Group Key Agreement Protocol for Ubiquitous Pay-TV Networks
    Khatoon, Shaheena
    Rahman, Sk Md Mizanur
    Tso, Raylin
    Alhamid, Mohammed F.
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (05): : 1387 - 1395
  • [50] Enhancing the Security of a 'More Efficient & Secure Dynamic ID-based Remote User Authentication Scheme'
    Khan, Muhammad Khurram
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 420 - 424