Provable user authentication scheme on ECC in multi-server environment

被引:4
作者
Toan-Thinh Truong [1 ]
Minh-Triet Tran [1 ]
Anh-Duc Duong [2 ]
Phuong-Nam Nguyen-Pham [1 ]
Nguyen, Hoang-Anh [3 ]
Nguyen, Trong-Nguyen [4 ]
机构
[1] Univ Sci, Ho Chi Minh City 700000, Vietnam
[2] Univ Informat Technol, Ho Chi Minh City 700000, Vietnam
[3] Aeva Co, Mountain View, CA USA
[4] Univ Quebec Montreal, Montreal, PQ, Canada
关键词
Authentication scheme; ECC; Smart-city; IoTs; User-identity; Multi-server; MUTUAL AUTHENTICATION; SMART CARD; SECURE;
D O I
10.1007/s11227-022-04641-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authentic communication is an inevitable trend in the fourth industrial revolution. In a city, the convenient administrative formalities should be quick, accurate and secure. There are many different public authorities with different functionalities, and a citizen needs to register with all agencies and keeps the various information corresponding to each service. Clearly, single and central registration is necessary because it stops us from repeatedly providing personal data to many places. In this work, we propose a provable elliptic curve cryptography-based authentication scheme in multi-server architecture, where a person registers with a trusted center once and becomes authorized to access all related service-providers which can leave and join at will without any influence on current users and different providers. Our proposed scheme is suitable for many practical applications, such as smart-city or internet of things.
引用
收藏
页码:725 / 761
页数:37
相关论文
共 38 条
[1]  
Bellare M, 2006, LECT NOTES COMPUT SC, V4004, P409
[2]  
Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
[3]   Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card [J].
Bouchaala, Mariem ;
Ghazel, Cherif ;
Saidane, Leila Azouz .
JOURNAL OF SUPERCOMPUTING, 2022, 78 (01) :497-522
[4]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[5]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[6]   IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks [J].
Cao, Xuefei ;
Kou, Weidong ;
Dang, Lanjun ;
Zhao, Bin .
COMPUTER COMMUNICATIONS, 2008, 31 (04) :659-667
[7]   An efficient and secure multi-server password authentication scheme using smart cards [J].
Chang, CC ;
Lee, JS .
2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2004, :417-422
[8]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[9]  
Eun-Jun Yoon, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P633, DOI 10.1109/CSE.2009.363
[10]   A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme [J].
Han, Lidong ;
Xie, Qi ;
Liu, Wenhao ;
Wang, Shengbao .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) :3391-3406