Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem

被引:134
作者
Yoon, Eun-Jun [1 ]
Yoo, Kee-Young [2 ]
机构
[1] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Taegu 702701, South Korea
[2] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
关键词
Authentication; Multi-server; Key agreement; Smart card; Biometrics; Elliptic curve cryptosystem; PASSWORD AUTHENTICATION; REMOTE; VERIFICATION;
D O I
10.1007/s11227-010-0512-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional single-server authentication schemes suffer a significant shortcoming. If a remote user wishes to use numerous network services, he/she must register his/her identity and password at these servers. It is extremely tedious for users to register numerous servers. In order to resolve this problem, various multi-server authentication schemes recently have been proposed. However, these schemes are insecure against some cryptographic attacks or inefficiently designed because of high computation costs. Moreover, these schemes do not provide strong key agreement function which can provide perfect forward secrecy. Based on these motivations, this paper proposes a new efficient and secure biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) without verification table to minimize the complexity of hash operation among all users and fit multi-server communication environments. By adopting the biometrics technique, the proposed scheme can provide more strong user authentication function. By adopting the ECC technique, the proposed scheme can provide strong key agreement function with the property of perfect forward secrecy to reduce the computation loads for smart cards. As a result, compared with related multi-serve authentication schemes, the proposed scheme has strong security and enhanced computational efficiency. Thus, the proposed scheme is extremely suitable for use in distributed multi-server network environments such as the Internet and in limited computations and communication resource environments to access remote information systems since it provides security, reliability, and efficiency.
引用
收藏
页码:235 / 255
页数:21
相关论文
共 39 条
[1]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[2]  
[Anonymous], 2002, CRYPTOGRAPHY THEORY
[3]  
[Anonymous], TENSOR REDUCTION ERR
[4]  
Blake-Wilson S, 1999, LECT NOTES COMPUT SC, V1556, P339
[5]  
Boyd Colin., 2003, INF SECUR CRYTOGR
[6]   An efficient and secure multi-server password authentication scheme using smart cards [J].
Chang, CC ;
Lee, JS .
2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2004, :417-422
[7]  
Chang YF, 2006, 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, P741
[8]  
Chen J, 2009, ACM T IN PRESS 0617
[9]   Activity completion duration based checkpoint selection for dynamic verification of temporal constraints in grid workflow systems [J].
Chen, Jinjun ;
Yang, Yun .
INTERNATIONAL JOURNAL OF HIGH PERFORMANCE COMPUTING APPLICATIONS, 2008, 22 (03) :319-329
[10]  
Chou JS, 2008, 2005544 EPRINT ARCH