Skip to main content
Erschienen in: Wireless Personal Communications 2/2017

18.05.2017

Cryptanalysis and Improvement of an Anonymous Multi-server Authenticated Key Agreement Scheme

verfasst von: Shipra Kumari, Hari Om

Erschienen in: Wireless Personal Communications | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A multi-server authentication scheme offers a single registration procedure, but allows to access services from multiple servers. For efficiently communicating with the servers, a number of password based remote user authentication schemes have been explored. Recently, Chuang and Chen (Expert Syst Appl 41(4):1411–1418, 2014) have discussed an anonymous multi-server a uthenticated key agreement scheme using smart card together with password and biometrics. This scheme achieves various security requirements while supporting multiple servers as claimed by the authors. In this paper, we show that this scheme is susceptible to different attacks, such as DOS attack, user/server impersonation attack, a smart card attack, session specific temporary key attack, and it does not achieve perfect forward secrecy. In this paper, we propose a new scheme by overcoming the drawbacks of the Chuang and Chen’s scheme. Our scheme can provide non-repudiation as the authentication message sent by a user is digitally signed by the server using the RSA digital signature. Due to efficiency and security, our scheme is suitable for the services like tele medicine information system, which can provide healthcare delivery services between the patients and doctors to employ telecare medicine facilities and access electronic medical records.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Xue, K., Hong, P., & Ma, C. (2014). A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. Journal of Computer and System Sciences, 80(1), 195–206.MathSciNetCrossRefMATH Xue, K., Hong, P., & Ma, C. (2014). A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. Journal of Computer and System Sciences, 80(1), 195–206.MathSciNetCrossRefMATH
2.
Zurück zum Zitat Chang, Y. F., Yu, S. H., & Shiao, D. R. (2013). A uniqueness-andanonymity preserving remote user authentication scheme for connected health care. Journal of Medical Systems, 37(2), 9902. doi:10.1007/s10916-012-9902-7.CrossRef Chang, Y. F., Yu, S. H., & Shiao, D. R. (2013). A uniqueness-andanonymity preserving remote user authentication scheme for connected health care. Journal of Medical Systems, 37(2), 9902. doi:10.​1007/​s10916-012-9902-7.CrossRef
3.
Zurück zum Zitat Lee, C. C., Lin, T. H., & Chang, R. X. (2011). A secure dynamic ID based remote user authentication scheme for multiserver environment using smart cards. Expert Systems with Applications, 38(11), 13863–13870. Lee, C. C., Lin, T. H., & Chang, R. X. (2011). A secure dynamic ID based remote user authentication scheme for multiserver environment using smart cards. Expert Systems with Applications, 38(11), 13863–13870.
4.
Zurück zum Zitat Li, X., Ma, J., Wang, W. D., Xiong, Y. P., & Zhang, J. S. (2012). A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling, 58(1–2), 85–95. doi:10.1016/j.mcm.2012.06.033. Li, X., Ma, J., Wang, W. D., Xiong, Y. P., & Zhang, J. S. (2012). A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling, 58(1–2), 85–95. doi:10.​1016/​j.​mcm.​2012.​06.​033.
5.
Zurück zum Zitat Li, X., Niu, J., Kumari, S., Liao, J., & Liang, W. (2014). An Enhancement of a smart card authentication scheme for multi-server architecture. Wireless Personal Communications. doi:10.1007/s11277-014-2002-x Li, X., Niu, J., Kumari, S., Liao, J., & Liang, W. (2014). An Enhancement of a smart card authentication scheme for multi-server architecture. Wireless Personal Communications. doi:10.​1007/​s11277-014-2002-x
6.
Zurück zum Zitat Chuang, M.-C., & Chen, M. C. (2014). An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Systems with Applications, 41(4), 1411–1418.CrossRef Chuang, M.-C., & Chen, M. C. (2014). An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Systems with Applications, 41(4), 1411–1418.CrossRef
7.
Zurück zum Zitat Yoon, E., & Yoo, K. (2013). Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. Journal of Supercomputing, 63(1), 235–255.CrossRef Yoon, E., & Yoo, K. (2013). Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. Journal of Supercomputing, 63(1), 235–255.CrossRef
9.
Zurück zum Zitat He, D., & Wang, D. (2014). Robust biometrics-based authentication scheme for multi-server environment. IEEE System Journal, 9(3), 1–8. He, D., & Wang, D. (2014). Robust biometrics-based authentication scheme for multi-server environment. IEEE System Journal, 9(3), 1–8.
11.
Zurück zum Zitat Lamport, L. (1981). Password authentication with in secure communication. Communications of the ACM, 24(11), 770–772.MathSciNetCrossRef Lamport, L. (1981). Password authentication with in secure communication. Communications of the ACM, 24(11), 770–772.MathSciNetCrossRef
12.
Zurück zum Zitat Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., & Chung, Y. (2012). A secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(3), 1529–1535.CrossRef Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., & Chung, Y. (2012). A secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(3), 1529–1535.CrossRef
13.
Zurück zum Zitat He, D., Chen, J., & Zhang, R. (2012). A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(3), 1989–1995.CrossRef He, D., Chen, J., & Zhang, R. (2012). A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(3), 1989–1995.CrossRef
14.
Zurück zum Zitat Wei, J., Hu, X., & Liu, W. (2012). An improved authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(6), 3597–3604.CrossRef Wei, J., Hu, X., & Liu, W. (2012). An improved authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(6), 3597–3604.CrossRef
15.
Zurück zum Zitat Zhu, Z. (2012). An efficient authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(6), 3833–3838.CrossRef Zhu, Z. (2012). An efficient authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(6), 3833–3838.CrossRef
16.
Zurück zum Zitat Lee, T. F., & Liu, C. M. (2013). A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 37(3), 1–8. Lee, T. F., & Liu, C. M. (2013). A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 37(3), 1–8.
17.
Zurück zum Zitat Das, A. K., & Bruhadeshwar, B. (2013). An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. Journal of Medical Systems, 37(5), 1–17.CrossRef Das, A. K., & Bruhadeshwar, B. (2013). An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. Journal of Medical Systems, 37(5), 1–17.CrossRef
18.
Zurück zum Zitat Chen, H. M., Lo, J. W., & Yeh, C. K. (2012). An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Journal of Medical Systems, 36(6), 3907–3915.CrossRef Chen, H. M., Lo, J. W., & Yeh, C. K. (2012). An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Journal of Medical Systems, 36(6), 3907–3915.CrossRef
19.
Zurück zum Zitat Cao, T., & Zhai, J. (2013). Improved dynamic id-based authentication scheme for telecare medical information systems. Journal of Medical Systems, 37(2), 1–7.CrossRef Cao, T., & Zhai, J. (2013). Improved dynamic id-based authentication scheme for telecare medical information systems. Journal of Medical Systems, 37(2), 1–7.CrossRef
20.
Zurück zum Zitat Lin, H. Y. (2013). On the security of a dynamic id-based authentication scheme for telecare medical information systems. Journal of Medical Systems, 37(2), 1–5.CrossRef Lin, H. Y. (2013). On the security of a dynamic id-based authentication scheme for telecare medical information systems. Journal of Medical Systems, 37(2), 1–5.CrossRef
21.
Zurück zum Zitat Xie, Q., Zhang, J., & Dong, N. (2013). Robust anonymous authentication scheme for telecare medical information systems. Journal of Medical Systems, 37(2), 1–8.CrossRef Xie, Q., Zhang, J., & Dong, N. (2013). Robust anonymous authentication scheme for telecare medical information systems. Journal of Medical Systems, 37(2), 1–8.CrossRef
22.
Zurück zum Zitat Jiang, Q., Ma, J., Ma, Z., & Li, G. (2013). A privacy enhanced authentication scheme for telecare medical information systems. Journal of Medical Systems, 37(1), 1–8.CrossRef Jiang, Q., Ma, J., Ma, Z., & Li, G. (2013). A privacy enhanced authentication scheme for telecare medical information systems. Journal of Medical Systems, 37(1), 1–8.CrossRef
23.
Zurück zum Zitat Wu, F., & Xu, L. (2013). Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. Journal of Medical Systems, 37(4), 1–9. doi:10.1007/s10916-013-9958-z.CrossRef Wu, F., & Xu, L. (2013). Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. Journal of Medical Systems, 37(4), 1–9. doi:10.​1007/​s10916-013-9958-z.CrossRef
24.
Zurück zum Zitat Mishra, D., & Mukhopadhyay, S. (2013). Cryptanalysis of Wu and Xus authentication scheme for telecare medicine information systems. arXiv preprint arXiv: 1309.5255. Mishra, D., & Mukhopadhyay, S. (2013). Cryptanalysis of Wu and Xus authentication scheme for telecare medicine information systems. arXiv preprint arXiv:​ 1309.​5255.
25.
Zurück zum Zitat Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2014). Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. Journal of Medical Systems, 38(2), 1–8.CrossRef Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2014). Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. Journal of Medical Systems, 38(2), 1–8.CrossRef
26.
Zurück zum Zitat Mishra, D. (2015). On the security flaws in ID-based password authentication schemes for telecare medical information systems. Journal of Medical Systems, 39(1), 1–16.MathSciNetCrossRef Mishra, D. (2015). On the security flaws in ID-based password authentication schemes for telecare medical information systems. Journal of Medical Systems, 39(1), 1–16.MathSciNetCrossRef
27.
Zurück zum Zitat Yanrong, L., Lixiang, L., Haipeng, P., & Yixian, Y. (2015). An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. Journal of Medical Systems, 39(3), 1–8. doi:10.1007/s10916-015-0221-7. Yanrong, L., Lixiang, L., Haipeng, P., & Yixian, Y. (2015). An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. Journal of Medical Systems, 39(3), 1–8. doi:10.​1007/​s10916-015-0221-7.
28.
Zurück zum Zitat Wen, F. T., & Guo, D. I. (2014). An improved anonymous authentication scheme for telecare medical information systems. Journal of Medical Systems, 38(5), 1–11. Wen, F. T., & Guo, D. I. (2014). An improved anonymous authentication scheme for telecare medical information systems. Journal of Medical Systems, 38(5), 1–11.
29.
Zurück zum Zitat Awasthi, A. K., & Srivastava, K. (2013). A biometric authentication scheme for telecare medicine information systems with nonce. Journal of Medical Systems, 37(5), 1–4.CrossRef Awasthi, A. K., & Srivastava, K. (2013). A biometric authentication scheme for telecare medicine information systems with nonce. Journal of Medical Systems, 37(5), 1–4.CrossRef
30.
Zurück zum Zitat Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., & Chaturvedi, A. (2014). Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. Journal of Medical Systems, 38(5), 1–11.CrossRef Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., & Chaturvedi, A. (2014). Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. Journal of Medical Systems, 38(5), 1–11.CrossRef
31.
Zurück zum Zitat Tan, Z. (2014). A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. Journal of Medical Systems, 38(3), 1–9.CrossRef Tan, Z. (2014). A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. Journal of Medical Systems, 38(3), 1–9.CrossRef
32.
Zurück zum Zitat Arshad, H., & Nikooghadam, M. (2014). Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 38(12), 1–12.CrossRef Arshad, H., & Nikooghadam, M. (2014). Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 38(12), 1–12.CrossRef
33.
Zurück zum Zitat Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer System, 8, 18–36.CrossRefMATH Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer System, 8, 18–36.CrossRefMATH
Metadaten
Titel
Cryptanalysis and Improvement of an Anonymous Multi-server Authenticated Key Agreement Scheme
verfasst von
Shipra Kumari
Hari Om
Publikationsdatum
18.05.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4310-4

Weitere Artikel der Ausgabe 2/2017

Wireless Personal Communications 2/2017 Zur Ausgabe

Neuer Inhalt