Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model

被引:111
|
作者
Xie, Qi [1 ]
Wong, Duncan S. [2 ]
Wang, Guilin [3 ]
Tan, Xiao [1 ]
Chen, Kefei [1 ]
Fang, Liming
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog & Network Secur, Hangzhou 311121, Zhejiang, Peoples R China
[2] Hong Kong Appl Sci & Technol Res Inst, Hong Kong, Hong Kong, Peoples R China
[3] Huawei Int Pte Ltd, Shield Lab, Cent Res Inst, Singapore 486035, Singapore
关键词
Security; password authentication; anonymity; smart card; dynamic ID; REMOTE USER AUTHENTICATION; SMART CARDS; SCHEME; CRYPTANALYSIS; ENHANCEMENT; IMPROVEMENT; EFFICIENT;
D O I
10.1109/TIFS.2017.2659640
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each other and generate a session key for the subsequent communications. With the rapid development of low-power and highly-efficient networks, such as pervasive and mobile computing network in recent years, many efficient AKE protocols have been proposed to achieve user privacy and authentication in the communications. Besides secure session key establishment, those AKE protocols offer some other useful functionalities, such as two-factor user authentication and mutual authentication. However, most of them have one or more weaknesses, such as vulnerability against lost-smart-card attack, offline dictionary attack, de-synchronization attack, or the lack of forward secrecy, and user anonymity or untraceability. Furthermore, an AKE scheme under the public key infrastructure may not be suitable for light-weight computational devices, and the security model of AKE does not capture user anonymity and resist lost-smart-card attack. In this paper, we propose a novel dynamic ID-based anonymous two-factor AKE protocol, which addresses all the above issues. Our protocol also supports smart card revocation and password update without centralized storage. Further, we extend the security model of AKE to support user anonymity and resist lost-smart-card attack, and the proposed scheme is provably secure in extended security model. The low-computational and bandwidth cost indicates that our protocol can be deployed for pervasive computing applications and mobile communications in practice.
引用
收藏
页码:1382 / 1392
页数:11
相关论文
共 50 条
  • [1] Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model"
    Li, Xiaowei
    Yang, Dengqi
    Zeng, Xing
    Chen, Benhui
    Zhang, Yuqing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) : 3344 - 3345
  • [2] A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing
    Wei, Fushan
    Zhang, Ruijie
    Ma, Chuangui
    [J]. FUNDAMENTA INFORMATICAE, 2018, 157 (1-2) : 201 - 220
  • [3] A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption
    Wei, Fushan
    Zhang, Ruijie
    Shen, Jian
    [J]. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 849 - 855
  • [4] A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity
    Yang, Xiaoyan
    Jiang, Han
    Hou, Mengbo
    Zheng, Zhihua
    Xu, Qiuliang
    Choo, Kim-Kwang Raymond
    [J]. NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 111 - 124
  • [5] A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
    Wu, Tsu-Yang
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [6] A simple and robust anonymous two-factor authenticated key exchange protocol
    Li, Xiaowei
    Zhang, Yuqing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (06) : 711 - 722
  • [7] Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision
    Abbasinezhad-Mood, Dariush
    Mazinani, Sayyed Majid
    Nikooghadam, Morteza
    Ostad-Sharif, Arezou
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1227 - 1238
  • [8] Tightly Secure ID-based Authenticated Key Exchange
    Mita, Takumu
    Yoneyama, Kazuki
    [J]. PROCEEDINGS OF THE 11TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, APKC 2024, 2024, : 42 - 53
  • [9] An Efficient ID-Based Authenticated Key Exchange Protocol
    Hu, Xuexian
    Liu, Wenfen
    Zhang, Jianhui
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 229 - +
  • [10] A two-factor authenticated key exchange protocol based on RSA with dynamic passwords
    Wei, Fushan
    Ma, Jianfeng
    Ma, Chuangui
    Li, Xinghua
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 257 - 265