A Novel Multiserver Authentication Scheme Using Proxy Resignature With Scalability and Strong User Anonymity

被引:23
作者
Xiong, Hu [1 ]
Kang, Zhiqing [1 ]
Chen, Jinhao [1 ]
Tao, Junyi [1 ]
Yuan, Chen [1 ]
Kumari, Saru [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610051, Peoples R China
[2] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 02期
基金
美国国家科学基金会;
关键词
Servers; Authentication; Protocols; Password; Scalability; Smart cards; Anonymity; multiple server; provable security; scalability; three-factor authentication; 3-FACTOR AUTHENTICATION; PASSWORD AUTHENTICATION; PROTOCOL; ATTACKS; DESIGN;
D O I
10.1109/JSYST.2020.2983198
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the indispensable part of the security demand in a distributed system, a variety of online services need to be protected from unauthorized access. Multiserver authentication (MA) is one of the most effective and promising approaches to guarantee one party the authenticity of its partner in the distributed system. In this article, we first elaborate the problem of scalability for MA protocol. After that, a two-level framework for multiserver environment is proposed to convert single-server authentication to MA with provable security and perfect scalability. Also, we give an instance of our novel infrastructure by adopting the idea of proxy resignature to achieve strong anonymity. Furthermore, the security analysis and performance evaluation show that our protocol is secure and practical.
引用
收藏
页码:2156 / 2167
页数:12
相关论文
共 51 条
[1]  
[Anonymous], 2015, 4 YEARS LATER ANTHEM
[2]  
[Anonymous], 2016, STATE SPONSORED YAHO
[3]  
[Anonymous], 2016, Number of smartphone users worldwide 2014-2020
[4]  
Ateniese G., 2005, P 12 ACM C COMP COMM, P310
[5]  
Backes Michael., 2013, Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, P237, DOI [10.1145/2517840.2517863, DOI 10.1145/2517840.2517863]
[6]   Privacy preserving multi-factor authentication with biometrics [J].
Bhargav-Spantzel, Abhilasha ;
Squicciarini, Anna ;
Modi, Shimon ;
Young, Matthew ;
Bertino, Elisa ;
Elliott, Stephen .
JOURNAL OF COMPUTER SECURITY, 2007, 15 (05) :529-560
[7]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[8]   A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards [J].
Chang, Chin-Chen ;
Cheng, Ting-Fang ;
Hsueh, Wei-Yuan .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (02) :290-306
[9]   Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment [J].
Chatterjee, Santanu ;
Roy, Sandip ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) :824-839