A Secure Three-Factor Remote User Authentication Scheme Using Elliptic Curve Cryptosystem

被引:1
|
作者
Ali, Rifaqat [1 ]
Pal, Arup Kumar [1 ]
机构
[1] Indian Sch Mines, Indian Inst Technol, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
Authentication; BAN logic; Biometric; Key agreement Elliptic curve cryptography (ECC); Smart card; PASSWORD AUTHENTICATION; SMART CARDS; CRYPTOGRAPHY; CRYPTANALYSIS; IMPROVEMENT;
D O I
10.1007/978-981-10-5565-2_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, three factors such as biometric, smart card, and password based authentication schemes have drawn considerable attention in the field of information security. In this paper, the authors have presented an elliptic curve cryptosystem based authentication scheme using biometric, smart card, and password and also analyzed the formal and informal security of the authentication scheme. In this scheme, the parameters of elliptic curve are derived from the biometric features like iris, fingerprints, etc., which is suitable to withstand the forgery. The formal and informal security analysis are done based on the BAN logic and suggested propositions, respectively. The security analysis ensures that the presented scheme can withstand various kinds of malicious attacks. In addition, the scheme is also comparable with other related schemes in the context of communication cost, computation cost, and smart card storage. The scheme is suitable to ensure high degree of security with reduced comparatively overhead.
引用
收藏
页码:9 / 24
页数:16
相关论文
共 50 条
  • [21] An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems
    Lidong Han
    Xiao Tan
    Shengbao Wang
    Xikun Liang
    Peer-to-Peer Networking and Applications, 2018, 11 : 63 - 73
  • [22] A SECURE AND EFFICIENT AUTHENTICATION WITH KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Qu, Juan
    Feng, Yuming
    Huang, Yi
    ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2015, (34): : 101 - 112
  • [23] Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics
    Fan, Chun-I
    Lin, Yi-Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (04) : 933 - 945
  • [24] Robust biometrics based three-factor remote user authentication scheme with key agreement
    Li, Xiong
    Niu, Jianwei
    Khan, Muhammad Khurram
    Liao, Junguo
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 105 - 110
  • [25] Provable user authentication scheme in telecare medicine information system using elliptic curve cryptosystem
    Toan Thinh Truong
    Duong Tien Phan
    Minh Triet Tran
    Anh Duc Duong
    Echizen, Isao
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 253 - 259
  • [26] Robust three-factor remote user authentication scheme with key agreement for multimedia systems
    Li, Xiong
    Niu, Jianwei
    Khan, Muhammad Khurram
    Liao, Junguo
    Zhao, Xiaoke
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 1916 - 1927
  • [27] Applying biometrics to design three-factor remote user authentication scheme with key agreement
    Li, Xiong
    Niu, Jianwei
    Wang, Zhibo
    Chen, Caisen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1488 - 1497
  • [28] Remote mutual authentication and key agreement scheme based on elliptic curve cryptosystem
    Yoon, Eun-Jun
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2011, 19 (03) : 335 - 347
  • [29] Secure authentication of WLAN based on elliptic curve cryptosystem
    Zhang, Long-Jun
    Han, Wei
    Chen, Ke-Fei
    Journal of Shanghai Jiaotong University (Science), 2007, 12 E (05) : 645 - 650
  • [30] Secure Authentication of WLAN Based on Elliptic Curve Cryptosystem
    张龙军
    韩玮
    陈克非
    JournalofShanghaiJiaotongUniversity, 2007, (05) : 645 - 650