Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity

被引:119
作者
Wang, Ding [1 ,3 ]
Wang, Nan [2 ]
Wang, Ping [2 ,3 ]
Qing, Sihan [2 ]
机构
[1] Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
[2] Peking Univ, Sch Software & Microelect, Beijing 100260, Peoples R China
[3] Natl Engn Res Ctr Software Engn, Beijing 100871, Peoples R China
基金
中国国家自然科学基金;
关键词
Password authentication; User anonymity; De-synchronization; Random oracle model; KEY AGREEMENT PROTOCOL; PASSWORD AUTHENTICATION; SMART-CARDS; MUTUAL AUTHENTICATION; ROBUST; ENHANCEMENT; EXCHANGE; CRYPTANALYSIS; LINKABILITY; FRAMEWORK;
D O I
10.1016/j.ins.2015.03.070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its simplicity, portability and robustness, two-factor authentication has received much interest in the past two decades. While security-related issues have been well studied, how to preserve user privacy in this type of protocols still remains an open problem. In ICISC 2012, Kim-Kim presented an efficient two-factor authentication scheme that attempts to provide user anonymity and to guard against various known attacks, offering many merits over existing works. However, in this paper we shall show that user privacy of Kim-Kim's scheme is achieved at the price of severe usability downgrade - a de-synchronization attack on user's pseudonym identities may render the scheme completely unusable unless the user re-registers. Besides this defect, it is also prone to known key attack and privileged insider attack. It is noted that our de-synchronization attack can also be applied to several latest schemes that strive to preserve user anonymity. As our main contribution, an enhanced scheme with provable security is suggested, and what we believe is most interesting is that superior security and privacy can be achieved at nearly no additional communication or computation cost. As far as we know, this work is the first one that defines a formal model to capture the feature of user un-traceability and that highlights the damaging threat of de-synchronization attack on privacy-preserving two-factor authentication schemes. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:162 / 178
页数:17
相关论文
共 108 条
[11]  
[Anonymous], J MED SYST
[12]  
[Anonymous], INT CIRC CARD SPEC P
[13]  
[Anonymous], 2009, Proceedings of the Second ACM Conference on Wireless Network Security, DOI DOI 10.1145/1514274.1514282
[14]  
[Anonymous], 2012, CRYPTOL EPRINT ARCH
[15]  
[Anonymous], IEEE T DEPEND SECUR
[16]  
[Anonymous], LNCS
[17]  
[Anonymous], SMART CARD SECURITY
[18]  
[Anonymous], FIPS 201 PERSONAL ID
[19]  
[Anonymous], INFOCOM 2010 P IEEE
[20]  
Balasch J, 2012, LECT NOTES COMPUT SC, V7178, P19, DOI 10.1007/978-3-642-27954-6_2