A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures

被引:25
作者
Xiong, Ling [1 ,2 ]
Li, Fagen [2 ]
Zeng, Shengke [1 ,2 ]
Peng, Tu [3 ]
Liu, Zhicai [1 ]
机构
[1] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
[3] Beijing Inst Technol, Sch Software, Beijing 100081, Peoples R China
基金
美国国家科学基金会;
关键词
Blockchain; multi-server; authentication; revocation; CERTIFIED PUBLIC KEYS; USER AUTHENTICATION; PASSWORD AUTHENTICATION; SECURE; AGREEMENT;
D O I
10.1109/ACCESS.2019.2939368
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-server authentication technology has become more and more popular with the extensive applications of networks. Although it has brought great convenience to people's life, security becomes a critical issue and attracts lots of attentions in both academia and industry. Over the past two decades, a series of multi-server authentication schemes without communication with the online registration center in each authentication phase using the self-certified public key cryptography have been proposed to enhance security. However, it may cause the single-point failure problem due to the centralized architecture. Besides, user revocation facility is not well resolved in these schemes. To the best of our knowledge, blockchain technology has lots of advantages, bringing a promising solution to the problems of single-point failure and user revocation compared with the traditional cryptography technologies. In this work, we apply the idea of blockchain technology to construct a privacy-awareness authentication scheme for the multi-server environment, which can achieve distributed registry and efficient revocation. Moreover, the proposed scheme not only provides multiple security requirements like mutual authentication, user anonymity and perfect forward secrecy, but also resists various kinds of malicious attacks. The security of the proposed scheme is proved by rigorous formal proof using the random oracle model. Compared with recently related schemes, the proposed scheme has better communication performance, which make it be very suitable for real-life applications.
引用
收藏
页码:125840 / 125853
页数:14
相关论文
共 57 条
[51]   Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies [J].
Tschorsch, Florian ;
Scheuermann, Bjoern .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :2084-2123
[52]   List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures [J].
Tseng, Yuh-Min ;
Huang, Sen-Shan ;
Tsai, Tung-Tso ;
Ke, Jia-Hua .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2016, 4 (01) :102-112
[53]   Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment [J].
Wang, Ding ;
He, Debiao ;
Wang, Ping ;
Chu, Chao-Hsien .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (04) :428-442
[54]  
Wang F., 2019, IEEE ACCESS, V7
[55]   An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services [J].
Xiong, Ling ;
Peng, Daiyuan ;
Peng, Tu ;
Liang, Hongbin .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12) :6169-6187
[56]   A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks [J].
Xiong, Ling ;
Peng, Daiyuan ;
Peng, Tu ;
Liang, Hongbin ;
Liu, Zhicai .
SENSORS, 2017, 17 (11)
[57]   An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation [J].
Yu, Jiangshan ;
Wang, Guilin ;
Mu, Yi ;
Gao, Wei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (12) :2302-2313