Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model

被引:114
作者
Xie, Qi [1 ]
Wong, Duncan S. [2 ]
Wang, Guilin [3 ]
Tan, Xiao [1 ]
Chen, Kefei [1 ]
Fang, Liming
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog & Network Secur, Hangzhou 311121, Zhejiang, Peoples R China
[2] Hong Kong Appl Sci & Technol Res Inst, Hong Kong, Hong Kong, Peoples R China
[3] Huawei Int Pte Ltd, Shield Lab, Cent Res Inst, Singapore 486035, Singapore
关键词
Security; password authentication; anonymity; smart card; dynamic ID; REMOTE USER AUTHENTICATION; SMART CARDS; SCHEME; CRYPTANALYSIS; ENHANCEMENT; IMPROVEMENT; EFFICIENT;
D O I
10.1109/TIFS.2017.2659640
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each other and generate a session key for the subsequent communications. With the rapid development of low-power and highly-efficient networks, such as pervasive and mobile computing network in recent years, many efficient AKE protocols have been proposed to achieve user privacy and authentication in the communications. Besides secure session key establishment, those AKE protocols offer some other useful functionalities, such as two-factor user authentication and mutual authentication. However, most of them have one or more weaknesses, such as vulnerability against lost-smart-card attack, offline dictionary attack, de-synchronization attack, or the lack of forward secrecy, and user anonymity or untraceability. Furthermore, an AKE scheme under the public key infrastructure may not be suitable for light-weight computational devices, and the security model of AKE does not capture user anonymity and resist lost-smart-card attack. In this paper, we propose a novel dynamic ID-based anonymous two-factor AKE protocol, which addresses all the above issues. Our protocol also supports smart card revocation and password update without centralized storage. Further, we extend the security model of AKE to support user anonymity and resist lost-smart-card attack, and the proposed scheme is provably secure in extended security model. The low-computational and bandwidth cost indicates that our protocol can be deployed for pervasive computing applications and mobile communications in practice.
引用
收藏
页码:1382 / 1392
页数:11
相关论文
共 40 条
[1]   JXTA-Overlay: A P2P Platform for Distributed, Collaborative, and Ubiquitous Computing [J].
Barolli, Leonard ;
Xhafa, Fatos .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2011, 58 (06) :2163-2172
[2]  
Bresson Emmanuel., 2003, ACM C COMPUTER COMMU, P241, DOI DOI 10.1145/948109.948142
[3]   A Secure Single Sign-On Mechanism for Distributed Computer Networks [J].
Chang, Chin-Chen ;
Lee, Chia-Yin .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (01) :629-637
[4]   An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Mahmood, Khalid ;
Ahmad, Hafiz Farooq ;
Khan, Muhammad Khurram .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) :5355-5373
[6]   An enhanced privacy preserving remote user authentication scheme with provable security [J].
Chaudhry, Shehzad Ashraf ;
Farash, Mohammad Sabzinejad ;
Naqvi, Husnain ;
Kumari, Saru ;
Khan, Muhammad Khurram .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3782-3795
[7]   Review of Security Issues in Industrial Networks [J].
Cheminod, Manuel ;
Durante, Luca ;
Valenzano, Adriano .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) :277-293
[8]   A survey of anonymity in wireless communication systems [J].
Chen, Hui ;
Xiao, Yang ;
Hong, Xiaoyan ;
Hu, Fei ;
Xie, Jiang .
SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (05) :427-444
[9]  
Chin-Chen Chang, 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, P252, DOI 10.1109/IIHMSP.2011.51
[10]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631