Skip to main content
Erschienen in: The Journal of Supercomputing 1/2023

18.07.2022

Provable user authentication scheme on ECC in multi-server environment

verfasst von: Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong, Phuong-Nam Nguyen-Pham, Hoang-Anh Nguyen, Trong-Nguyen Nguyen

Erschienen in: The Journal of Supercomputing | Ausgabe 1/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Authentic communication is an inevitable trend in the fourth industrial revolution. In a city, the convenient administrative formalities should be quick, accurate and secure. There are many different public authorities with different functionalities, and a citizen needs to register with all agencies and keeps the various information corresponding to each service. Clearly, single and central registration is necessary because it stops us from repeatedly providing personal data to many places. In this work, we propose a provable elliptic curve cryptography-based authentication scheme in multi-server architecture, where a person registers with a trusted center once and becomes authorized to access all related service-providers which can leave and join at will without any influence on current users and different providers. Our proposed scheme is suitable for many practical applications, such as smart-city or internet of things.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Lamport L (1981) Password authentication with insecure communication. Commun ACM 3468:770–772CrossRef Lamport L (1981) Password authentication with insecure communication. Commun ACM 3468:770–772CrossRef
2.
Zurück zum Zitat Das ML, Saxena A, Gulati VP (2004) A dynamic ID-based remote user authentication scheme. IEEE Trans Consum Electron 50(2):629–631CrossRef Das ML, Saxena A, Gulati VP (2004) A dynamic ID-based remote user authentication scheme. IEEE Trans Consum Electron 50(2):629–631CrossRef
3.
Zurück zum Zitat Liao IE, Lee CC, Hwang MS (2005) Security enhancement for a dynamic ID-based remote user authentication scheme, In: International Conference on Next Generation Web Services Practices, Seoul, Korea Liao IE, Lee CC, Hwang MS (2005) Security enhancement for a dynamic ID-based remote user authentication scheme, In: International Conference on Next Generation Web Services Practices, Seoul, Korea
4.
Zurück zum Zitat Yoon EJ, Yoo KY (2006) Improving the dynamic ID-based remote mutual authentication scheme. OTM Workshops, LNCS 4277:499–507 Yoon EJ, Yoo KY (2006) Improving the dynamic ID-based remote mutual authentication scheme. OTM Workshops, LNCS 4277:499–507
5.
Zurück zum Zitat Tian X, Wong DS, Zhu RW (2005) Analysis and improvement of authenticated key exchange protocol for sensor networks. IEEE Commun Lett 9(11):970–972CrossRef Tian X, Wong DS, Zhu RW (2005) Analysis and improvement of authenticated key exchange protocol for sensor networks. IEEE Commun Lett 9(11):970–972CrossRef
6.
Zurück zum Zitat Yang JH, Chang CC (2009) An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput Secur 28(3–4):138–143CrossRef Yang JH, Chang CC (2009) An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput Secur 28(3–4):138–143CrossRef
7.
Zurück zum Zitat Yoon EJ, Yoo KY (2009) Robust ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC, In: International Conference on Computational Science and Engineering, pp. 633-640 Yoon EJ, Yoo KY (2009) Robust ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC, In: International Conference on Computational Science and Engineering, pp. 633-640
8.
Zurück zum Zitat Hafizul Islam SK, Biswas GP (2011) A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve crypto-system. J Syst Softw 84(11):1892–1898CrossRef Hafizul Islam SK, Biswas GP (2011) A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve crypto-system. J Syst Softw 84(11):1892–1898CrossRef
9.
Zurück zum Zitat Tsaur WJ, Wu CC, Lee WB (2001) A flexible user authentication for multi-server internet services. In: International Conference on Networking, LNCS 2093:174–183 Tsaur WJ, Wu CC, Lee WB (2001) A flexible user authentication for multi-server internet services. In: International Conference on Networking, LNCS 2093:174–183
10.
Zurück zum Zitat Li L, Lin I, Hwang M (2001) A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans Neural Networks 12(6):1498–1504CrossRef Li L, Lin I, Hwang M (2001) A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans Neural Networks 12(6):1498–1504CrossRef
11.
Zurück zum Zitat Juang WS (2004) Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans Consum Electron 50(1):251–255CrossRef Juang WS (2004) Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans Consum Electron 50(1):251–255CrossRef
12.
Zurück zum Zitat Chang CC, Lee JS (2004) An efficient and secure multi-server password authentication scheme using smart cards, In: IEEE Proceeding of the International Conference on Cyberworlds, pp 417-422 Chang CC, Lee JS (2004) An efficient and secure multi-server password authentication scheme using smart cards, In: IEEE Proceeding of the International Conference on Cyberworlds, pp 417-422
13.
Zurück zum Zitat Liao YP, Wang SS (2009) A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput Stand Interfaces 31(1):24–29CrossRef Liao YP, Wang SS (2009) A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput Stand Interfaces 31(1):24–29CrossRef
14.
Zurück zum Zitat Hsiang HC, Shih WK (2009) Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(6):1118–1123CrossRef Hsiang HC, Shih WK (2009) Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(6):1118–1123CrossRef
15.
Zurück zum Zitat Sood SK, Sarje AK, Singh K (2011) A secure dynamic identity based authentication protocol for multi-server architecture. J Netw Comput Appl 34(2):609–618CrossRef Sood SK, Sarje AK, Singh K (2011) A secure dynamic identity based authentication protocol for multi-server architecture. J Netw Comput Appl 34(2):609–618CrossRef
16.
Zurück zum Zitat Lee CC, Lin TH, Chang RX (2011) A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Syst Appl 38(11):13863–13870 Lee CC, Lin TH, Chang RX (2011) A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Syst Appl 38(11):13863–13870
17.
Zurück zum Zitat Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58(1–2):85–95CrossRef Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58(1–2):85–95CrossRef
18.
Zurück zum Zitat Pippal RS, Jaidhar CD, Tapaswi S (2013) Robust smart card authentication scheme for multi-server architecture. Wirel Pers Commun 72(1):729–745CrossRef Pippal RS, Jaidhar CD, Tapaswi S (2013) Robust smart card authentication scheme for multi-server architecture. Wirel Pers Commun 72(1):729–745CrossRef
19.
Zurück zum Zitat Yeh KH (2014) A provably secure multi-server based authentication scheme. Int J Commun Syst 79(3):1621–1634 Yeh KH (2014) A provably secure multi-server based authentication scheme. Int J Commun Syst 79(3):1621–1634
20.
Zurück zum Zitat Hafizul Islam SK (2014) A provably secure id-based mutual authentication and key agreement scheme for mobile multi-server environment Without ESL Attack. Wirel Pers Commun 79(3):1975–1991CrossRef Hafizul Islam SK (2014) A provably secure id-based mutual authentication and key agreement scheme for mobile multi-server environment Without ESL Attack. Wirel Pers Commun 79(3):1975–1991CrossRef
21.
Zurück zum Zitat Tsai JL, Lo NW (2015) Provably secure and efficient anonymous id-based authentication protocol for mobile devices using bi-linear pairings. Wirel Pers Commun 83(2):1273–1286CrossRef Tsai JL, Lo NW (2015) Provably secure and efficient anonymous id-based authentication protocol for mobile devices using bi-linear pairings. Wirel Pers Commun 83(2):1273–1286CrossRef
22.
Zurück zum Zitat Cao X, Kou W, Dang L, Zhao B (2008) IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. Comput Commun 31(4):659–667CrossRef Cao X, Kou W, Dang L, Zhao B (2008) IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. Comput Commun 31(4):659–667CrossRef
23.
Zurück zum Zitat Mishra D (2016) Design and analysis of a provably secure multi-server authentication scheme. Wirel Pers Commun 86(3):1095–1119CrossRef Mishra D (2016) Design and analysis of a provably secure multi-server authentication scheme. Wirel Pers Commun 86(3):1095–1119CrossRef
24.
Zurück zum Zitat Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36CrossRefMATH Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36CrossRefMATH
25.
Zurück zum Zitat Bellare M, Rogaway P (2006) The security of triple encryption and a framework for code-based game-playing proofs. Adv Cryptol LNCS 4004:409–426MathSciNetMATH Bellare M, Rogaway P (2006) The security of triple encryption and a framework for code-based game-playing proofs. Adv Cryptol LNCS 4004:409–426MathSciNetMATH
26.
Zurück zum Zitat Wilson SB, Johnson D, Menezes A (1997) Key agreement protocols and their security analysis, In The 6th IMA International Conference on Cryptography and Coding, LNCS 1355, pp 30-45 Wilson SB, Johnson D, Menezes A (1997) Key agreement protocols and their security analysis, In The 6th IMA International Conference on Cryptography and Coding, LNCS 1355, pp 30-45
27.
Zurück zum Zitat Jangirala S, Mukhopadhyay S, Das AK (2017) A multi-server environment with secure and efficient remote user authentication scheme based on dynamic id using smart cards. Wireless Pers Commun 95(3):2735–2767CrossRef Jangirala S, Mukhopadhyay S, Das AK (2017) A multi-server environment with secure and efficient remote user authentication scheme based on dynamic id using smart cards. Wireless Pers Commun 95(3):2735–2767CrossRef
29.
Zurück zum Zitat Bouchaala M, Ghazel C, Saidane LA (2022) Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card. J Supercomput 78:497–522CrossRef Bouchaala M, Ghazel C, Saidane LA (2022) Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card. J Supercomput 78:497–522CrossRef
30.
Zurück zum Zitat Shamshad S, Ayub MF, Mahmood K, Kumari S, Chaudhry SA, Chen CM (2022) An enhanced scheme for mutual authentication for healthcare services. Digit Commun Netw 8(2):150–161CrossRef Shamshad S, Ayub MF, Mahmood K, Kumari S, Chaudhry SA, Chen CM (2022) An enhanced scheme for mutual authentication for healthcare services. Digit Commun Netw 8(2):150–161CrossRef
31.
Zurück zum Zitat Park Y, Park KS, Park YH (2019) Secure user authentication scheme with novel server mutual verification for multi-server environments. Int J Commun Syst 32(7):1–17CrossRef Park Y, Park KS, Park YH (2019) Secure user authentication scheme with novel server mutual verification for multi-server environments. Int J Commun Syst 32(7):1–17CrossRef
32.
Zurück zum Zitat Hankerson D, Menezes AJ, Vanstone S (2004) Guide to Elliptic Curve Cryptography, Berlin. Springer-Verlag, Germany Hankerson D, Menezes AJ, Vanstone S (2004) Guide to Elliptic Curve Cryptography, Berlin. Springer-Verlag, Germany
33.
Zurück zum Zitat Li F, Xin X, Hu Y (2008) Identity-based broadcast signcryption. Comput Stand Interfaces 30(1–2):89–94CrossRef Li F, Xin X, Hu Y (2008) Identity-based broadcast signcryption. Comput Stand Interfaces 30(1–2):89–94CrossRef
34.
Zurück zum Zitat Tsai JL, Wu TC, Tsai KY (2010) New dynamic ID authentication scheme using smart cards. Int J Commun Syst 23(12):1449–1462CrossRef Tsai JL, Wu TC, Tsai KY (2010) New dynamic ID authentication scheme using smart cards. Int J Commun Syst 23(12):1449–1462CrossRef
36.
Zurück zum Zitat Canetti R, Krawczyk H (2001) Analysis of key exchange schemes and their use for building secure channels. Adv Cryptol Eurocrypt LNCS 2045:451–472MATH Canetti R, Krawczyk H (2001) Analysis of key exchange schemes and their use for building secure channels. Adv Cryptol Eurocrypt LNCS 2045:451–472MATH
37.
Zurück zum Zitat Han L, Xie Q, Liu W, Wang S (2017) A new efficient chaotic maps based three factor user authentication and key agreement scheme. Wireless Pers Commun 95(3):3391–3406CrossRef Han L, Xie Q, Liu W, Wang S (2017) A new efficient chaotic maps based three factor user authentication and key agreement scheme. Wireless Pers Commun 95(3):3391–3406CrossRef
38.
Zurück zum Zitat Li X, Niu J, Kumari S, Islam SKH, Wu F, Khan MK, Das AK (2016) A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wireless Pers Commun 89(2):569–597CrossRef Li X, Niu J, Kumari S, Islam SKH, Wu F, Khan MK, Das AK (2016) A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wireless Pers Commun 89(2):569–597CrossRef
Metadaten
Titel
Provable user authentication scheme on ECC in multi-server environment
verfasst von
Toan-Thinh Truong
Minh-Triet Tran
Anh-Duc Duong
Phuong-Nam Nguyen-Pham
Hoang-Anh Nguyen
Trong-Nguyen Nguyen
Publikationsdatum
18.07.2022
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 1/2023
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-022-04641-x

Weitere Artikel der Ausgabe 1/2023

The Journal of Supercomputing 1/2023 Zur Ausgabe

Premium Partner