An efficient and secure multi-server authentication scheme with key agreement

被引:54
作者
Tsaur, Woei-Jiunn [1 ]
Li, Jia-Hong [2 ]
Lee, Wei-Bin [2 ]
机构
[1] Da Yeh Univ, Dept Informat Management, Changhua 51591, Taiwan
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
关键词
Authentication; Key exchange; Information security; Computer networks; Smart card; REMOTE PASSWORD AUTHENTICATION; SMART CARD; ANONYMITY; ROBUST;
D O I
10.1016/j.jss.2011.10.049
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Remote user authentication is used to validate the legitimacy of a remote log-in user. Due to the rapid growth of computer networks, many network environments have been becoming multi-server based. Recently, much research has been focused on proposing remote password authentication schemes based on smart cards for securing multi-server environments. Each of these schemes used either a nonce or a timestamp technique to prevent the replay attack. However, using the nonce technique to withstand the replay attack is potentially susceptible to the man-in-the-middle attack. Alternatively, when employing the timestamp method to secure remote password authentication, it will require the cost of implementing clock synchronization. In order to solve the above two issues, this paper proposes a self-verified timestamp technique to help the smart-card-based authentication scheme not only effectively achieve password-authenticated key agreement but also avoid the difficulty of implementing clock synchronization in multi-server environments. A secure authenticated key agreement should accomplish both mutual authentication and session key establishment. Therefore, in this paper we further give the formal proof on the execution of the proposed authenticated key agreement scheme. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:876 / 882
页数:7
相关论文
共 33 条
[1]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[2]   REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS [J].
CHANG, CC ;
WU, TC .
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03) :165-168
[3]   USING SMART CARDS TO AUTHENTICATE REMOTE PASSWORDS [J].
CHANG, CC ;
HWANG, SJ .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 26 (07) :19-27
[4]   Enhanced authentication scheme with anonymity for roaming service in global mobility networks [J].
Chang, Chin-Chen ;
Lee, Chia-Yin ;
Chi, Yen-Chang .
COMPUTER COMMUNICATIONS, 2009, 32 (04) :611-618
[5]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[6]   A strong user authentication scheme with smart cards for wireless communications [J].
He, Daojing ;
Ma, Maode ;
Zhang, Yan ;
Chen, Chun ;
Bu, Jiajun .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :367-374
[7]   A Distributed Active-Vision Network-Space Approach for the Navigation of a Car-Like Wheeled Robot [J].
Hwang, Chih-Lyang ;
Shih, Chin-Yuan .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2009, 56 (03) :846-855
[8]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[9]   Robust and efficient password-authenticated key agreement using smart cards [J].
Juang, Wen-Shenq ;
Chen, Sian-Teng ;
Liaw, Horng-Twu .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2008, 55 (06) :2551-2556
[10]   Efficient multi-server password authenticated key agreement using smart cards [J].
Juang, WS .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) :251-255