A Secure Anonymous Password-based Authentication Protocol with Control of Authentication Numbers

被引:0
|
作者
Shin, SeongHan [1 ]
Kobara, Kazukuni [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Koto Ku, 2-4-7 Aomi, Tokyo 1350064, Japan
关键词
KEY EXCHANGE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymous password-based authentication protocols are designed to provide not only password-based authentication but also client anonymity. In [10], Qian et al., proposed a simple anonymous password-based authentication (SAPAKE) protocol. In this paper, we revisit the SAPAKE protocol [10] by first showing that an outside attacker can specify which client has actually communicated with the server in the SAPAKE protocol with probability 1. Then, we propose a secure anonymous password-based authentication (for short, SAP) protocol that provides security against modification attacks on protocol-specific values, and is more efficient than SAPAKE [10]. As an additional feature, a server in the SAP protocol can control the number of anonymous client authentication.
引用
收藏
页码:325 / 329
页数:5
相关论文
共 50 条
  • [1] On Unlinkability of Password-Based Anonymous Authentication
    Shin, SeongHan
    Kobara, Kazukuni
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (06) : 1320 - 1324
  • [2] Secure password-based authentication in WLAN
    Keshava, M.
    [J]. Journal of the Indian Institute of Science, 2006, 86 (04) : 389 - 396
  • [3] A Protocol to Strengthen Password-Based Authentication
    Sandoval, Itzel Vazquez
    Stojkovski, Borce
    Lenzini, Gabriele
    [J]. EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2018, 2018, 11263 : 38 - 46
  • [4] Secure password-based authentication scheme with anonymous identity without smart cards
    The Key Laboratory of Aerospace Information Security and Trust Computing, School of Computer, Wuhan University, Wuhan 430072, China
    不详
    不详
    [J]. Tongxin Xuebao, 2008, 10 (70-75):
  • [5] A provably secure password-based anonymous authentication scheme for wireless body area networks
    Wei, Fushan
    Vijayakumar, P.
    Shen, Jian
    Zhang, Ruijie
    Li, Li
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 65 : 322 - 331
  • [6] Password-based independent authentication and key exchange protocol
    Jung, KS
    Kim, JY
    Chung, TC
    [J]. ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1908 - 1912
  • [7] Password-based user authentication protocol for mobile environment
    Moon, Sung-Won
    Kim, Young-Gab
    Moon, Chang-Joo
    Baik, Doo-Kwon
    [J]. Information Networking: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 743 - 753
  • [8] An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (13) : 1956 - 1967
  • [9] How to Preserve User Anonymity in Password-Based Anonymous Authentication Scheme
    Shin, SeongHan
    Kobara, Kazukuni
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (03): : 803 - 807
  • [10] Security analysis and improvement of the efficient password-based authentication protocol
    Kwon, T
    Park, YH
    Lee, HJ
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (01) : 93 - 95