A survey of authenticated key agreement protocols for multi-server architecture

被引:12
作者
ul Haq, Inam [1 ]
Wang, Jian [1 ]
Zhu, Youwen [1 ]
Maqbool, Saad [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut NUAA, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Natl Univ Sci & Technol, Islamabad 4600, Pakistan
关键词
Authenticated key agreement; Multi-Server architecture; Biometric; Elliptic curve cryptography; Chebyshev chaotic maps; Bilinear map; Finite field cryptography; CERTIFIED PUBLIC KEYS; USER AUTHENTICATION; SMART CARD; PASSWORD AUTHENTICATION; CHAOTIC MAP; SCHEME; SECURE; EFFICIENT; BIOMETRICS; ROBUST;
D O I
10.1016/j.jisa.2020.102639
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a comprehensive survey of authenticated key agreement protocols, which have been proposed for multi-server architectures. The growing use of cloud-based services has made multi-server authentication protocols a necessity. For a brief insight into the topic, the break-fix history of these protocols, vital functional and security requirements have been summarized. Protocols are categorized based upon the cryptographic mechanism used. To evaluate the trade-off between security and performance, comprehensive analysis concerning performance and security of multiple protocols, from each category, has been carried out. Some profound results of this survey include: 1) the majority of existing protocols engage the registration server (RS) in the mutual authentication, which results in extra communication overhead and creates a computational bottleneck on RS end. Secondly, majority of the hash-based protocols with offline RS are vulnerable to key compromise impersonation attacks. Thirdly very few schemes consider the efficient and demanded revocation of compromised participants. Finally, among all these protocols, pairing-based designs are the most computationally expensive.
引用
收藏
页数:16
相关论文
共 99 条
[1]   Password-based authenticated key exchange in the three-party setting [J].
Abdalla, M. ;
Fouque, P.-A. ;
Pointcheval, D. .
IEE Proceedings: Information Security, 2006, 153 (01) :27-39
[2]   An anonymous and robust multi-server authentication protocol using multiple registration servers [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Obaidat, Mohammad S. ;
Biswas, G. P. ;
Hsiao, Kuei-Fang .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)
[3]   A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Khan, Muhammad Khurram ;
Karati, Arijit ;
Giri, Debasis ;
Kumari, Saru .
SECURITY AND COMMUNICATION NETWORKS, 2017,
[4]   Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment [J].
Amin, Ruhul ;
Biswas, G. P. .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (01) :439-462
[5]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[6]   Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment [J].
Barman, Subhas ;
Das, Ashok Kumar ;
Samanta, Debasis ;
Chattopadhyay, Samiran ;
Rodrigues, Joel J. P. C. ;
Park, Youngho .
IEEE ACCESS, 2018, 6 :38578-38594
[7]  
Bellare M., 1993, LNCS, VCRYPTO 93, P232, DOI DOI 10.1007/3-540-48329-2_21
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[10]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453