A key agreement scheme for identity authentication based on multiple security factors

被引:0
作者
Wang Y. [1 ]
Peng X. [1 ]
Bian J. [1 ,2 ]
机构
[1] College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan, 030024, Shanxi
[2] The Center of Information and Network, Shanxi Medical College of Continuing Education, Taiyuan, 030012, Shanxi
来源
International Journal of Simulation: Systems, Science and Technology | 2016年 / 17卷 / 03期
关键词
Attack; Authentication; Biometric; ECC; Smart card;
D O I
10.5013/IJSSST.a.17.03.13
中图分类号
学科分类号
摘要
By the study of Li-Hwang's three-factor authenticated key agreement protocol, we find there exists multiple attack in it. Therefore, this paper proposes a remote user authentication protocol based on ECC to improve the protocol. The new protocol only needs one point multiplication of elliptic curve cryptography in login and authentication protocol, so its computation efficiency is high. The protocol can resist all the attack mentioned in this paper, smart cards loss attack included. It is also suited to three-factor authentication protocol including password, mobile devices and biometrics. The comparisons with related schemes in computation price and efficiency show that though it costs a little more computation consumption than relative protocols, it has better performance in robustness. © 2016, UK Simulation Society. All rights reserved.
引用
收藏
页码:13.1 / 13.7
相关论文
共 50 条
[21]   An enhanced authentication with key agreement scheme for satellite communication systems [J].
Qi, Mingping ;
Chen, Jianhua .
INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2018, 36 (03) :296-304
[22]   Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC [J].
Sahoo, Shreeya Swagatika ;
Mohanty, Sujata ;
Majhi, Banshidhar .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (02) :991-1017
[23]   Identity-based Remote Authentication and Key Agreement Protocol with Anonymity [J].
Zhang Jianjun ;
Wu Qiwu .
PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 :14-17
[24]   Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC [J].
Shreeya Swagatika Sahoo ;
Sujata Mohanty ;
Banshidhar Majhi .
Wireless Personal Communications, 2020, 111 :991-1017
[25]   On the Security of a Mutual Authentication and Key Agreement Protocol based on Chaotic Maps [J].
Chen, Chien-Ming ;
Xu, Linlin ;
Zhang, Xiaojie ;
Wu, Tsu-Yang ;
Pan, Jeng-Shyang .
2015 THIRD INTERNATIONAL CONFERENCE ON ROBOT, VISION AND SIGNAL PROCESSING (RVSP), 2015, :143-146
[26]   An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks [J].
Li, Chun-Ta ;
Weng, Chi-Yao ;
Lee, Cheng-Chi .
SENSORS, 2013, 13 (08) :9589-9603
[27]   Security Enhancements of Smart Card-Based Remote User Password Authentication Scheme with Session Key Agreement [J].
An, Young-Hwa .
2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, :669-674
[28]   QKBAKA: A Quantum-Key-Based Authentication and Key Agreement Scheme for Internet of Vehicles [J].
Shi, Qin ;
Yang, Ze ;
Cheng, Teng ;
Wang, Chuansu ;
Wu, Zexu ;
Zhang, Xing ;
Xu, Peiling .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) :12292-12306
[29]   On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems [J].
Arshad, Hamed ;
Teymoori, Vahid ;
Nikooghadam, Morteza ;
Abbassi, Hassan .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
[30]   On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems [J].
Hamed Arshad ;
Vahid Teymoori ;
Morteza Nikooghadam ;
Hassan Abbassi .
Journal of Medical Systems, 2015, 39