MAKA: Provably Secure Multi-factor Authenticated Key Agreement Protocol

被引:2
|
作者
Liu, Xiaoxue [1 ]
Li, Yanping [1 ]
Qu, Juan [2 ]
Jiang, Qi [3 ,4 ]
机构
[1] Shaanxi Normal Univ, Sch Math & Informat Sci, Xian, Shaanxi, Peoples R China
[2] Chongqing Three Gorges Univ, Sch Math & Stat, Chongqing, Peoples R China
[3] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2018年 / 19卷 / 03期
关键词
Multi-factor authentication; Biometrics; Random oracle model; Computational Diffie-Hellman problem (CDHP); SCHEME; PRIVACY; CARD;
D O I
10.3966/160792642018051903005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Remote authentication is important to protect a networked server against malicious remote logins in complex systems, it is also the most efficient method to determine the identity of a remote user. Recently, Li et al. proposed an enhanced smart card based remote user password authentication scheme, referred to as LNKL scheme. In this paper, we first analyze LNKL scheme and show their scheme is vulnerable to key compromise impersonation attack and smart card impersonated attack. Besides, LNKL scheme does not provide user's anonymity and privacy protection. LNKL scheme still has some design flaws such as non-repairability. Furthermore, LNKL scheme adopts two-factor authentication (password and smart-card), which are easily compromised. Based on LNKL scheme and biometrics- based multi-factor authentication, an improved multi-factor authentication (short for MAKA) is proposed in this paper, which not only keeps the merits of LNKL scheme, but also achieves more security features. In addition, the MAKA protocol can be formally proved securely against passive and active attacks under the computational Diffie-Hellman problem assumption in the random oracle model. As a result, it is more well-suited for mobile application scenarios where resource is constrained and security is concerned.
引用
收藏
页码:669 / 677
页数:9
相关论文
共 50 条
  • [41] Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    [J]. INFORMATION SCIENCES, 2011, 181 (19) : 4318 - 4329
  • [42] Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting
    Liu, Ying
    Wei, Fushan
    Ma, Chuangui
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 255 - 267
  • [43] A secure authenticated key agreement protocol for application at digital certificat
    Saadatmandan, Javad
    Rahimi, Amirhossein
    [J]. International Journal of Network Security, 2020, 22 (02) : 250 - 256
  • [44] An improved Secure Authenticated Group Key Agreement Protocol for WMNs
    Jin, Zhen-Ai
    Park, Geum-Dal
    Yoo, Kee-Young
    [J]. ALPIT 2008: SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED LANGUAGE PROCESSING AND WEB INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 412 - +
  • [45] An Improved Secure Certificateless Authenticated Group Key Agreement Protocol
    Geng, Manman
    Zhang, Futai
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 337 - 341
  • [46] Provably secured lightweight authenticated key agreement protocol for modern health industry
    Abdussami, Mohammad
    Amin, Ruhul
    Vollala, Satyanarayana
    [J]. AD HOC NETWORKS, 2023, 141
  • [47] An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Xie, Qi
    Li, Xiong
    Farash, Mohammad Sabzinejad
    Kumari, Saru
    Wu, Fan
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) : 811 - 828
  • [48] An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture
    Azeem Irshad
    Shehzad Ashraf Chaudhry
    Qi Xie
    Xiong Li
    Mohammad Sabzinejad Farash
    Saru Kumari
    Fan Wu
    [J]. Arabian Journal for Science and Engineering, 2018, 43 : 811 - 828
  • [49] Provably secure and password-authenticated hybrid key agreement protocol in two-realm with privacy-protection
    Zhu, Dan
    Zhu, Hong Feng
    Geng, Shuai
    Wang, Rui
    [J]. Journal of Information Hiding and Multimedia Signal Processing, 2018, 9 (04): : 775 - 784
  • [50] A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Vijayakumar, Pandi
    Kumar, Neeraj
    Park, YoHan
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 1732 - 1741