A key agreement scheme for identity authentication based on multiple security factors

被引:0
作者
Wang Y. [1 ]
Peng X. [1 ]
Bian J. [1 ,2 ]
机构
[1] College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan, 030024, Shanxi
[2] The Center of Information and Network, Shanxi Medical College of Continuing Education, Taiyuan, 030012, Shanxi
来源
International Journal of Simulation: Systems, Science and Technology | 2016年 / 17卷 / 03期
关键词
Attack; Authentication; Biometric; ECC; Smart card;
D O I
10.5013/IJSSST.a.17.03.13
中图分类号
学科分类号
摘要
By the study of Li-Hwang's three-factor authenticated key agreement protocol, we find there exists multiple attack in it. Therefore, this paper proposes a remote user authentication protocol based on ECC to improve the protocol. The new protocol only needs one point multiplication of elliptic curve cryptography in login and authentication protocol, so its computation efficiency is high. The protocol can resist all the attack mentioned in this paper, smart cards loss attack included. It is also suited to three-factor authentication protocol including password, mobile devices and biometrics. The comparisons with related schemes in computation price and efficiency show that though it costs a little more computation consumption than relative protocols, it has better performance in robustness. © 2016, UK Simulation Society. All rights reserved.
引用
收藏
页码:13.1 / 13.7
相关论文
共 50 条
[41]   An Efficient Lightweight Key Agreement and Authentication Scheme for WBAN [J].
Rehman, Zia Ur ;
Altaf, Saud ;
Iqbal, Saleem .
IEEE ACCESS, 2020, 8 :175385-175397
[42]   A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chilamkurti, Naveen .
INFORMATION SCIENCES, 2015, 321 :263-277
[43]   Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud [J].
Zhong, Hong ;
Zhang, Chuanwang ;
Cui, Jie ;
Xu, Yan ;
Liu, Lu .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) :1592-1603
[44]   Identity-based efficient authentication and key agreement protocol for mobile Internet [J].
Wang, Zhen ;
Ma, Zhao-Feng ;
Luo, Shou-Shan .
Tongxin Xuebao/Journal on Communications, 2017, 38 (08) :19-27
[45]   On the security of HY-key authentication scheme [J].
Zhan, B ;
Li, Z ;
Yang, Y ;
Hu, Z .
COMPUTER COMMUNICATIONS, 1999, 22 (08) :739-741
[46]   Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol [J].
Bagheri, Nasour ;
Bendavid, Ygal ;
Safkhani, Masoumeh ;
Rostampour, Samad .
FUTURE INTERNET, 2024, 16 (01)
[47]   RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications [J].
Safkhani, Masoumeh ;
Bagheri, Nasour ;
Kumari, Saru ;
Tavakoli, Hamidreza ;
Kumar, Sachin ;
Chen, Jiahui .
IEEE ACCESS, 2020, 8 :200851-200862
[48]   A SECURE AND EFFICIENT AUTHENTICATION WITH KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM [J].
Qu, Juan ;
Feng, Yuming ;
Huang, Yi .
ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2015, (34) :101-112
[49]   Strong Authentication with Key Agreement Scheme for Web-based Collaborative Systems [J].
Lu, Yung-Feng ;
Lin, Po-Hung ;
Ye, Sheng-Shang ;
Wang, Rong-Sheng ;
Chou, Shih-Chun .
IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATIONS SYSTEMS (ISPACS 2012), 2012,
[50]   A AAV Swarm Authentication and Key Agreement Scheme Based on Latin Square Design [J].
Xia, Tao ;
Wang, Menglin ;
He, Jun ;
Ni, Lin ;
Yang, Gang .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2025, 14 (03) :581-585