MAKA: Provably Secure Multi-factor Authenticated Key Agreement Protocol

被引:2
|
作者
Liu, Xiaoxue [1 ]
Li, Yanping [1 ]
Qu, Juan [2 ]
Jiang, Qi [3 ,4 ]
机构
[1] Shaanxi Normal Univ, Sch Math & Informat Sci, Xian, Shaanxi, Peoples R China
[2] Chongqing Three Gorges Univ, Sch Math & Stat, Chongqing, Peoples R China
[3] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2018年 / 19卷 / 03期
关键词
Multi-factor authentication; Biometrics; Random oracle model; Computational Diffie-Hellman problem (CDHP); SCHEME; PRIVACY; CARD;
D O I
10.3966/160792642018051903005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Remote authentication is important to protect a networked server against malicious remote logins in complex systems, it is also the most efficient method to determine the identity of a remote user. Recently, Li et al. proposed an enhanced smart card based remote user password authentication scheme, referred to as LNKL scheme. In this paper, we first analyze LNKL scheme and show their scheme is vulnerable to key compromise impersonation attack and smart card impersonated attack. Besides, LNKL scheme does not provide user's anonymity and privacy protection. LNKL scheme still has some design flaws such as non-repairability. Furthermore, LNKL scheme adopts two-factor authentication (password and smart-card), which are easily compromised. Based on LNKL scheme and biometrics- based multi-factor authentication, an improved multi-factor authentication (short for MAKA) is proposed in this paper, which not only keeps the merits of LNKL scheme, but also achieves more security features. In addition, the MAKA protocol can be formally proved securely against passive and active attacks under the computational Diffie-Hellman problem assumption in the random oracle model. As a result, it is more well-suited for mobile application scenarios where resource is constrained and security is concerned.
引用
收藏
页码:669 / 677
页数:9
相关论文
共 50 条
  • [1] Multi-factor Identity Authenticated Key Agreement Protocol
    Wang, Jun
    Chen, Yue
    Yang, Gang
    Jia, Hongyong
    Lan, Julong
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5597 - 5602
  • [2] A provably secure authenticated key agreement protocol for wireless communications
    Guo, Hua
    Xu, Chang
    Mu, Yi
    Li, Zhoujun
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (03) : 563 - 572
  • [3] Provably secure and efficient certificateless authenticated tripartite key agreement protocol
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1213 - 1221
  • [4] Provably secure authenticated key agreement protocol based on hierarchical identity
    Cao, Chen-Lei
    Liu, Ming-Qi
    Zhang, Ru
    Yang, Yi-Xian
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (12): : 2848 - 2854
  • [5] A provably secure authenticated key agreement protocol for industrial sensor network system
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (23):
  • [6] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    [J]. 2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [7] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [8] Provably efficient authenticated key agreement protocol for multi-servers
    Hwang, Ren-Junn
    Shiau, Sheng-Hua
    [J]. COMPUTER JOURNAL, 2007, 50 (05): : 602 - 615
  • [9] A secure authenticated key agreement protocol
    Popescu, C
    [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
  • [10] PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION
    Shao, Shuai
    Tian, Bin
    Wang, Xin
    Li, Yang
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1240 - 1244