Design and Analysis of a Provably Secure Multi-server Authentication Scheme

被引:27
作者
Mishra, Dheerendra [1 ]
机构
[1] LNM Inst Informat Technol, Dept Math, Jaipur, Rajasthan, India
关键词
Multi-server authentication; Smart card; Security; Privacy; SMART-CARD; EFFICIENT; PROTOCOL; ARCHITECTURE; IDENTITY;
D O I
10.1007/s11277-015-2975-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Authenticated key agreement protocols play an important role to ensure authorized and secure communication over public network. In recent years, several authentication protocols have been proposed for single-server environment. Most of these protocols present efficient and secure solution for single-server environment. However, adoption of these protocols for multi-server environment is not feasible as user have to register on each server, separately. On the contrary, multi-server authentication schemes require single registration. The one time registration mechanism makes the system user-friendly and supports inter-operability. Unfortunately, most of the existing multi-server authentication schemes require all servers to be trusted, involvement of central authority in mutual authentication or multiple secret keys. In general, a servers may be semi-trusted, thus considering all server to be trusted does not seems to be realistic scenario. Involvement of central authority in mutual authentication may create bottleneck scenario for large network. Also, computation of multiple secret keys may not be suitable for smart card based environment as smart card keeps limited storage space. To overcome these drawbacks, we aim to design an authentication scheme for multi-server environment, where all servers does not need to be trusted, central authority does not require in mutual authentication and smart card need not to store multiple secret keys. In this paper, we first analyze the security of recently proposed Yeh's smart card based multi-server authentication scheme (Yeh in Wirel Pers Commun 79(3):1621-1634, 2014). We show that Yeh's scheme does not resist off-line password guessing attack, insider attack and user impersonation attack. Furthermore, we propose an efficient multi-server authentication scheme which does not require all servers to be trusted, central authority no longer needed in authentication and smart card need not to store multiple secret keys. We prove the correctness of mutual authentication of our scheme using the widely-accepted BAN logic. Through the security analysis, we show that our scheme is secure against various known attacks including the attacks found in Yeh's scheme. In addition, the proposed scheme is comparable in terms of the communication and computational overheads with related schemes.
引用
收藏
页码:1095 / 1119
页数:25
相关论文
共 50 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3570, P341
[2]  
Aumasson JP, 2010, LECT NOTES COMPUT SC, V6225, P1, DOI 10.1007/978-3-642-15031-9_1
[3]  
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1
[4]  
Bellare M, 1997, LECT NOTES COMPUT SC, V1294, P470
[5]  
Boyd C., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P240
[6]  
Boyd Colin., 2003, INF SECUR CRYTOGR
[7]   A LOGIC OF AUTHENTICATION [J].
BURROWS, M ;
ABADI, M ;
NEEDHAM, RM .
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871) :233-271
[8]   Breaking a remote user authentication scheme for multi-server architecture [J].
Cao, Xiang ;
Zhong, Sheng .
IEEE COMMUNICATIONS LETTERS, 2006, 10 (08) :580-581
[9]   An efficient and secure multi-server password authentication scheme using smart cards [J].
Chang, CC ;
Lee, JS .
2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2004, :417-422
[10]  
Chaturvedi Ankita, 2013, Information Systems Security. 9th International Conference, ICISS 2013. Proceedings: LNCS 8303, P63, DOI 10.1007/978-3-642-45204-8_5