How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security

被引:4
作者
Chuang, Yun-Hsin [1 ]
Lei, Chin-Laung [1 ]
Shiu, Hung-, Jr. [2 ]
机构
[1] Natl Taiwan Univ, Dept Elect Engn, Taipei 10617, Taiwan
[2] Tunghai Univ, Dept Comp Sci, Taichung 407224, Taiwan
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 09期
关键词
anonymity; authentication; biometric; key exchange; multi-server; privacy; three-factor authentication; EXCHANGE PROTOCOL; SCHEME; RESILIENT; EFFICIENT; ATTACKS;
D O I
10.3390/sym13091629
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
An anonymous authentication and key agreement (AAKA) protocol provides anonymous members symmetric authentication and establishes a symmetric session key for secure communication in public networks. Today, numerous popular remote services are based on multi-server architecture, such as the internet of things (IoT), smart cities, cloud services, vehicular ad hoc networks (VANET), and telecare medicine information systems (TMIS). Many researchers have attempted to design AAKA protocols in multi-server environments for various applications. However, many of these have security defects, even if they have so-called "formal" security proofs. In this paper, we analyze related AAKA protocols to identify the common design defects, expound the process of designing secure AAKA protocols, and explain why the present AAKA protocols still suffer attacks, despite having security proofs. We instruct readers on how to design a secure AAKA protocol and how to prove the security. This paper will therefore be helpful for the design of new AAKA protocols, and for ensuring their security.
引用
收藏
页数:9
相关论文
共 38 条
[11]   A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC [J].
Chandrakar, Preeti ;
Om, Hari .
COMPUTER COMMUNICATIONS, 2017, 110 :26-34
[12]   Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment [J].
Chandrakar, Preeti ;
Om, Hari .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (12)
[13]   Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks [J].
Chang, I-Pin ;
Lee, Tian-Fu ;
Lin, Tsung-Hung ;
Liu, Chuan-Ming .
SENSORS, 2015, 15 (12) :29841-29854
[14]  
Choi Y, 2016, INT J DISTRIB SENS N, DOI [10.1155/2016/3479247, 10.1155/2016/8572410]
[15]   An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics [J].
Chuang, Ming-Chin ;
Chen, Meng Chang .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) :1411-1418
[16]   Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines [J].
Chuang, Yun-Hsin ;
Lei, Chin-Laung ;
Shiu, Hung-, Jr. .
2020 15TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2020), 2020, :66-73
[17]   Robust Biometrics-Based Authentication Scheme for Multiserver Environment [J].
He, Debiao ;
Wang, Ding .
IEEE SYSTEMS JOURNAL, 2015, 9 (03) :816-823
[18]   A Trust Update Mechanism Based on Reinforcement Learning in Underwater Acoustic Sensor Networks [J].
He, Yu ;
Han, Guangjie ;
Jiang, Jinfang ;
Wang, Hao ;
Martinez-Garcia, Miguel .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (03) :811-821
[19]   A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks [J].
Hsieh, Tsung-Che ;
Tseng, Yuh-Min ;
Huang, Sen-Shan .
IEEE ACCESS, 2020, 8 :121795-121810
[20]   An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures [J].
Hsieh, Wen-Bin ;
Leu, Jenq-Shiou .
JOURNAL OF SUPERCOMPUTING, 2014, 70 (01) :133-148