An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures

被引:0
|
作者
Wen-Bin Hsieh
Jenq-Shiou Leu
机构
[1] National Taiwan University of Science and Technology,Department of Electronic Engineering
来源
关键词
User authentication; Pairing-based; Multi-server; Smart card;
D O I
暂无
中图分类号
学科分类号
摘要
As a smart phone becomes a daily necessity, mobile services are springing up. A mobile user should be authenticated and authorized before accessing these mobile services. Generally, mobile user authentication is a method which is used to validate the legitimacy of a mobile login user. As the rapid booming of computer networks, multi-server architecture has been pervasive in many network environments. Much recent research has been focused on proposing password-based remote user authentication protocols using smart cards for multi-server environments. To protect the privacy of users, many dynamic identity based remote user authentication protocols were proposed. In 2009, Hsiang and Shih claimed their protocol is efficient, secure, and suitable for the practical application environment. However, Sood et al. pointed out Hsiang et al.’s protocol is susceptible to replay attack, impersonation attack and stolen smart card attack. Moreover, the password change phase of Hsiang et al.’s protocol is incorrect. Thus, Sood et al. proposed an improved protocol claimed to be practical and computationally efficient. Nevertheless, Li et al. found that Sood et al.’s protocol is still vulnerable to leak-of-verifier attack, stolen smart card attack and impersonation attack and consequently proposed an improvement to remove the aforementioned weaknesses. In 2012, Liao et al. proposed a novel pairing-based remote user authentication protocol for multi-server environment, the scheme based on elliptic curve cryptosystem is more secure and efficient. However, through careful analyses, we find that Liao et al.’s protocol is still susceptible to the trace attack. Besides, Liao et al.’s protocol is inefficient since each service server has to update its ID table periodically. In this paper, we propose an improved protocol to solve these weaknesses. By enhancing the security, the improved protocol is well suited for the practical environment.
引用
收藏
页码:133 / 148
页数:15
相关论文
共 50 条
  • [21] An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices
    Alzahrani, Bander A.
    Chaudhry, Shehzad Ashraf
    Barnawi, Ahmed
    Al-Barakati, Abdullah
    Shon, Taeshik
    ELECTRONICS, 2020, 9 (03)
  • [22] Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings
    SHAO Zu-huaDepartment of Computer and Electronic Engineering
    WuhanUniversityJournalofNaturalSciences, 2005, (01) : 267 - 270
  • [23] An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Yoon, Eun-Jun
    Yoo, Kee-Young
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3371 - 3396
  • [24] Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment
    Feng, Qi
    He, Debiao
    Zeadally, Sherali
    Wang, Huaqun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 239 - 251
  • [26] Comment on a Digital Signature Scheme with Using Self-certified Public Keys
    Zhang Jianhong
    Chen Hua
    Gao Shengnan
    Geng Qin
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 678 - 680
  • [27] Efficient proxy signature schemes using self-certified public keys
    Hsu, CL
    Wu, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 152 (03) : 807 - 820
  • [28] A threshold proxy signature scheme using self-certified public keys
    Xue, QS
    Cao, ZF
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2004, 3358 : 715 - 724
  • [29] Cryptanalysis of group signature scheme using self-certified public keys
    Sun, HM
    Chen, BJ
    Hwang, T
    ELECTRONICS LETTERS, 1999, 35 (22) : 1938 - 1939
  • [30] Cryptanalysis of an authenticated encryption scheme using self-certified public keys
    Tsai, CS
    Lin, SC
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 118 - 122