A key agreement scheme for identity authentication based on multiple security factors

被引:0
作者
Wang Y. [1 ]
Peng X. [1 ]
Bian J. [1 ,2 ]
机构
[1] College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan, 030024, Shanxi
[2] The Center of Information and Network, Shanxi Medical College of Continuing Education, Taiyuan, 030012, Shanxi
来源
International Journal of Simulation: Systems, Science and Technology | 2016年 / 17卷 / 03期
关键词
Attack; Authentication; Biometric; ECC; Smart card;
D O I
10.5013/IJSSST.a.17.03.13
中图分类号
学科分类号
摘要
By the study of Li-Hwang's three-factor authenticated key agreement protocol, we find there exists multiple attack in it. Therefore, this paper proposes a remote user authentication protocol based on ECC to improve the protocol. The new protocol only needs one point multiplication of elliptic curve cryptography in login and authentication protocol, so its computation efficiency is high. The protocol can resist all the attack mentioned in this paper, smart cards loss attack included. It is also suited to three-factor authentication protocol including password, mobile devices and biometrics. The comparisons with related schemes in computation price and efficiency show that though it costs a little more computation consumption than relative protocols, it has better performance in robustness. © 2016, UK Simulation Society. All rights reserved.
引用
收藏
页码:13.1 / 13.7
相关论文
共 50 条
[31]   Two security problems of efficient remote mutual authentication and key agreement [J].
Yoon, Eun-Jun ;
Yoo, Kee-Young .
PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, :66-+
[32]   Resilient Group Key Agreement Protocol with Authentication Security [J].
Rajaram, M. ;
Thilagavathy, D. ;
Devi, N. Kanjana .
2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGIES (ICICT), 2010,
[33]   A KEY AGREEMENT BASED ANONYMITY SCHEME [J].
Chan, Chao-Wen ;
Chin, Te-Chih .
2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, :659-663
[34]   A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor [J].
Rituparna Paul ;
Shanvendra Rai ;
Subhasish Banerjee ;
Preetisudha Meher .
Peer-to-Peer Networking and Applications, 2024, 17 :432-450
[35]   An efficient and secure multi-server authentication scheme with key agreement [J].
Tsaur, Woei-Jiunn ;
Li, Jia-Hong ;
Lee, Wei-Bin .
JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (04) :876-882
[36]   Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme [J].
Holbl, Marko ;
Welzer, Tatjana ;
Brumen, Bostjan .
CRYPTOLOGIA, 2010, 34 (01) :52-59
[37]   An Improved User Authentication and Key Agreement Scheme Providing User Anonymity [J].
Ya-Fen Chang and Pei-Yu Chang Department of Computer Science and Information Engineering ;
National Taichung Institute of Technology .
JournalofElectronicScienceandTechnology, 2011, 9 (04) :352-358
[38]   Robust biometrics based three-factor remote user authentication scheme with key agreement [J].
Li, Xiong ;
Niu, Jianwei ;
Khan, Muhammad Khurram ;
Liao, Junguo .
2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, :105-110
[39]   A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor [J].
Paul, Rituparna ;
Rai, Shanvendra ;
Banerjee, Subhasish ;
Meher, Preetisudha .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) :432-450
[40]   Robust Remote Mutual Authentication Scheme with Key Agreement [J].
Chou, Chih-Ho ;
Tsai, Kuo-Yu ;
Wu, Tzong-Chen .
JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (07) :1283-1289