Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 1/2018

05.09.2016

An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems

verfasst von: Lidong Han, Xiao Tan, Shengbao Wang, Xikun Liang

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, many authentication schemes have been provided which are based on biometrics with password and smart cards. The three-factor schemes can provide high security for remote authentication between a user and a server. In 2015, Lu et al. proposed a three-factor authentication scheme based on elliptic curve cryptography. However, we show that Lu et al’s scheme leaks user’s identity and is vulnerable to impersonation attacks. To enhance the scheme’s security, we propose a new efficient three-factor authentication scheme. Furthermore, we give a formal security proof under BAN logic and random orale model. From comparative results of some recent ones, our scheme is efficient and secure for practical applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Arshad H, Nikooghadam M (2014) Three-Factor Anonymous authentication and key agreement scheme for telecare medicine information systems. J Med Syst 38(12):136–147CrossRef Arshad H, Nikooghadam M (2014) Three-Factor Anonymous authentication and key agreement scheme for telecare medicine information systems. J Med Syst 38(12):136–147CrossRef
2.
Zurück zum Zitat Burrow M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36CrossRef Burrow M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36CrossRef
3.
Zurück zum Zitat Chang C-C, Wu T-C (1991) Remote password authentication with smart cards. Comput Digit Tech IEE Proc E 138(3):165–168CrossRef Chang C-C, Wu T-C (1991) Remote password authentication with smart cards. Comput Digit Tech IEE Proc E 138(3):165–168CrossRef
4.
Zurück zum Zitat Chang C-C, Hwang S-J (1993) Using smart cards to authenticate remote passwords. Comput Math Appl 26(7):19–27CrossRefMATH Chang C-C, Hwang S-J (1993) Using smart cards to authenticate remote passwords. Comput Math Appl 26(7):19–27CrossRefMATH
5.
Zurück zum Zitat Chang YF, Yu SH, Shiao DR (2013) An uniqueness and anonymity-preserving remote user authentication scheme for connected health care. J Med Syst 37(12):9902–9910CrossRef Chang YF, Yu SH, Shiao DR (2013) An uniqueness and anonymity-preserving remote user authentication scheme for connected health care. J Med Syst 37(12):9902–9910CrossRef
6.
Zurück zum Zitat Chen C, Lee C, Hsu C (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst 25(2):585–597CrossRef Chen C, Lee C, Hsu C (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst 25(2):585–597CrossRef
7.
Zurück zum Zitat Chiou S-Y, Ying Z, Liu J (2016) Improvement of a privacy authentication scheme based on cloud for medical environment. J Med Syst 40:101CrossRef Chiou S-Y, Ying Z, Liu J (2016) Improvement of a privacy authentication scheme based on cloud for medical environment. J Med Syst 40:101CrossRef
8.
Zurück zum Zitat Chuang YH, Tseng YM (2010) An efficient dynamic group key agreement protocol for imbalanced wireless networks. Int J Netw Manag 20(4):167–180 Chuang YH, Tseng YM (2010) An efficient dynamic group key agreement protocol for imbalanced wireless networks. Int J Netw Manag 20(4):167–180
9.
Zurück zum Zitat Das ML, Saxena A, Gulati VP (2004) A dynamic ID-based remote user authentication scheme. IEEE Trans Consum Electron 50(2):629–631CrossRef Das ML, Saxena A, Gulati VP (2004) A dynamic ID-based remote user authentication scheme. IEEE Trans Consum Electron 50(2):629–631CrossRef
10.
Zurück zum Zitat Das AK (2015) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-peer Netw Appl 9(1):223–244CrossRef Das AK (2015) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-peer Netw Appl 9(1):223–244CrossRef
11.
Zurück zum Zitat He DB, Chen JH, Zhang R (2012) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36(2):1989–1995 He DB, Chen JH, Zhang R (2012) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36(2):1989–1995
12.
Zurück zum Zitat Jin AT, Ling D, Goh A (2004) Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245–2255CrossRef Jin AT, Ling D, Goh A (2004) Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245–2255CrossRef
13.
Zurück zum Zitat Khan MK, Kim KS, Alghathbar K (2010) Cryptanalysis and security enhancement of a more efficient secure dynamic idbased remote user authentication scheme. Comput Commun 34(3):305–309CrossRef Khan MK, Kim KS, Alghathbar K (2010) Cryptanalysis and security enhancement of a more efficient secure dynamic idbased remote user authentication scheme. Comput Commun 34(3):305–309CrossRef
14.
Zurück zum Zitat Khan M, Kuman C, Gupta M (2014) More efficient key-hash based fingerprint remote authentication scheme using device. Computing 96(9):793–816MathSciNetCrossRef Khan M, Kuman C, Gupta M (2014) More efficient key-hash based fingerprint remote authentication scheme using device. Computing 96(9):793–816MathSciNetCrossRef
15.
Zurück zum Zitat Kocher P, Jaffe J, Jun B (1999) Differential power analysis, Proceedings of 19th Annual International Cryptology conference(CRYPTO’99). LNCS 1666:388–397 Kocher P, Jaffe J, Jun B (1999) Differential power analysis, Proceedings of 19th Annual International Cryptology conference(CRYPTO’99). LNCS 1666:388–397
16.
Zurück zum Zitat Ku W, Chen S (2004) Impersonation attack on a dynamic ID based remote user authentication using smartcards. IEICE Trans Commun E88-B:2165–2167CrossRef Ku W, Chen S (2004) Impersonation attack on a dynamic ID based remote user authentication using smartcards. IEICE Trans Commun E88-B:2165–2167CrossRef
18.
Zurück zum Zitat Lu Y, Li L, Peng H, Yang Y (2015) An enhanced Biometric-Based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(2):1–9CrossRef Lu Y, Li L, Peng H, Yang Y (2015) An enhanced Biometric-Based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(2):1–9CrossRef
19.
Zurück zum Zitat Lu Y, Li L, Peng H, Yang Y (2016) A secure and efficient mutual authentication scheme for session initiation protocol. Peer-to-Peer Netw Appl 9(1):449–459CrossRef Lu Y, Li L, Peng H, Yang Y (2016) A secure and efficient mutual authentication scheme for session initiation protocol. Peer-to-Peer Netw Appl 9(1):449–459CrossRef
20.
Zurück zum Zitat Lumini A, Nanni L (2007) Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 40(3):1057–1065CrossRefMATH Lumini A, Nanni L (2007) Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 40(3):1057–1065CrossRefMATH
21.
Zurück zum Zitat Messerges TS, Dabbish EA, Sloan RH (2002) Examining smartcard security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552MathSciNetCrossRef Messerges TS, Dabbish EA, Sloan RH (2002) Examining smartcard security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552MathSciNetCrossRef
22.
Zurück zum Zitat Mir O, Munilla J, Kumari S (2015) Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks. Peer-to-Peer Netw Appl:1–13 Mir O, Munilla J, Kumari S (2015) Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks. Peer-to-Peer Netw Appl:1–13
23.
Zurück zum Zitat Mishra D, Das AK, Mukhopadhyay S (2016) A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Netw Appl 9(1):171–192CrossRef Mishra D, Das AK, Mukhopadhyay S (2016) A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Netw Appl 9(1):171–192CrossRef
24.
Zurück zum Zitat Moon J, Choi Y, Kim J, Won D (2016) An improvement of robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. J Med Syst 40:70CrossRef Moon J, Choi Y, Kim J, Won D (2016) An improvement of robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. J Med Syst 40:70CrossRef
25.
Zurück zum Zitat Siddiqui Z, Abdullah A-H, Khan M-K, Lee H-C, Alghamdi A-S (2015) Cryptanalysis and improvement of ’a secure authentication scheme for telecare medical information system’ with nonce verification, Peer-to-Peer Netw Appl, pp 1–13. doi:10.1007/s12083-015-0364-9 Siddiqui Z, Abdullah A-H, Khan M-K, Lee H-C, Alghamdi A-S (2015) Cryptanalysis and improvement of ’a secure authentication scheme for telecare medical information system’ with nonce verification, Peer-to-Peer Netw Appl, pp 1–13. doi:10.​1007/​s12083-015-0364-9
26.
Zurück zum Zitat Wang YY, Kiu JY, Xiao FX, Dan J (2009) A more efficient secure dynamic ID-based remote user authentication. Comput Commun 32:583–585CrossRef Wang YY, Kiu JY, Xiao FX, Dan J (2009) A more efficient secure dynamic ID-based remote user authentication. Comput Commun 32:583–585CrossRef
27.
Zurück zum Zitat Wang XM, Zhang WF, Zhang JS, Khan MK (2007) Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Comput Stander Interface 29:507–512CrossRef Wang XM, Zhang WF, Zhang JS, Khan MK (2007) Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Comput Stander Interface 29:507–512CrossRef
28.
Zurück zum Zitat Wu Z-Y, Lee Y-C, Lai F, Lee H-C, Chung Y (2012) A secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1529–1535CrossRef Wu Z-Y, Lee Y-C, Lai F, Lee H-C, Chung Y (2012) A secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1529–1535CrossRef
29.
Zurück zum Zitat Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client server networks. Comput Electr Eng 45(C):274285 Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client server networks. Comput Electr Eng 45(C):274285
30.
Zurück zum Zitat Yeh H-L, Chen T-H, Hu K-J, Shih W-K (2013) Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data. IET Inf Secur 7(3):247252CrossRef Yeh H-L, Chen T-H, Hu K-J, Shih W-K (2013) Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data. IET Inf Secur 7(3):247252CrossRef
Metadaten
Titel
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems
verfasst von
Lidong Han
Xiao Tan
Shengbao Wang
Xikun Liang
Publikationsdatum
05.09.2016
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 1/2018
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-016-0499-3

Weitere Artikel der Ausgabe 1/2018

Peer-to-Peer Networking and Applications 1/2018 Zur Ausgabe