Journal of Jilin University(Engineering and Technology Edition) ›› 2018, Vol. 48 ›› Issue (5): 1586-1592.doi: 10.13229/j.cnki.jdxbgxb20171258

Previous Articles     Next Articles

Improved anonymous authentication protocol for multi-server architectures

YU Yi-cheng, HU Liang, CHI Ling, CHU Jian-feng   

  1. College of Computer Science and Technology, Jilin University, Changchun 130012, China
  • Received:2017-12-21 Online:2018-09-20 Published:2018-12-11

Abstract: The three-factor authentication and key agreement protocol proposed by Guo et al can not achieve perfect forward secrecy and can not support the update of user's biometric. In order to remedy these flaws, we propose an improved authentication protocol for multi-server architecture by use of Diffie-Hellman key exchange technology. Analysis shows that the proposed protocol is able to remedy the security flaws of the original scheme, meet the security requirements of multi-server environment and is able to withstand various possible attacks.

Key words: computer system architecture, authentication, multi-server architecture, anonymous, key agreement

CLC Number: 

  • TP309
[1] Jiang Q,Ma J,Li G,et al.An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks[J].Wireless Personal Communications,2013,68(4):1477-1491.
[2] Lamport L.Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24(11): 770-772.
[3] Chandrakar P, Om H.A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC[J]. Computer Communications, 2017,110:26-34.
[4] Irshad A, Sher M, Ahmad H F, et al.An improved multi-server authentication scheme for distributed mobile cloud computing services[J]. TIIS, 2016, 10(12): 5529-5552.
[5] Chatterjee K, De A.A novel multi-server authentication scheme for e-commerce applications using smart card[J]. Wireless Personal Communications, 2016, 91(1): 293-312.
[6] Yeh K H.A provably secure multi-server based authentication scheme[J]. Wireless Personal Communications, 2014, 79(3): 1621-1634.
[7] Tan Z.A secure privacy-preserving remote user authentication scheme using smart cards for multi-server environment[J].International Journal on Information,2012,15(4):1547-1558.
[8] Kim H, Jeon W, Lee K, et al.Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme[C]∥ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications. Berlin:Springer,2012:391-406.
[9] Wang B,Ma M.A smart card based efficient and secured multi-server authentication scheme[J].Wireless Personal Communications,2013,68(2):361-378.
[10] Yang D, Yang B.A biometric password-based multi-server authentication scheme with smart card[C]∥International Conference on Computer Design and Applications, IEEE, 2010:554-559.
[11] Mishra D, Das A K, Mukhopadhyay S.A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards[J]. Expert Systems with Applications, 2014, 41(18): 8129-8143.
[12] Sood S K, Sarje A K, Singh K.A secure dynamic identity based authentication protocol for multi-server architecture[J]. Journal of Network and Computer Applications, 2011, 34(2): 609-618.
[13] Li X, Xiong Y, Ma J, et al.An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards[J]. Journal of Network and Computer Applications, 2012, 35(2): 763-769.
[14] Chuang M C, Chen M C.An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics[J]. Expert Systems with Applications, 2014, 41(4): 1411-1418.
[15] Guo H, Wang P, Zhang X, et al.A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments[J]. PloS One, 2017, 12(11): e0187403.
[16] He D, Gao Y, Chan S, et al.An enhanced two-factor user authentication scheme in wireless sensor networks[J]. Ad Hoc & Sensor Wireless Networks, 2010,10(4):361-371.
[1] YU Bin-bin, WU Xin-yu, CHU Jian-feng, HU Liang. Signature protocol for wireless sensor network based on group key agreement [J]. 吉林大学学报(工学版), 2017, 47(3): 924-929.
[2] ZHAO Bo, QIN Gui-he. High robustness image watermarking algorithm [J]. 吉林大学学报(工学版), 2017, 47(1): 249-254.
[3] HAO Ping-ting, HU Liang, JIANG Jing-yan, CHE Xi-long. Optimistic lock protocol of multi-managed nodes [J]. 吉林大学学报(工学版), 2017, 47(1): 227-234.
[4] WEI Xiao-hui, LIU Zhi-liang, ZHUANG Yuan, LI Hong-liang, LI Xiang. Adaptive checkpoint mechanism supporting large-scale stream data processing [J]. 吉林大学学报(工学版), 2017, 47(1): 199-207.
[5] ZHANG Yi-wen,GUO Rui-feng. Low-power scheduling algorithm for mixed task in real-time system [J]. 吉林大学学报(工学版), 2015, 45(1): 261-266.
[6] ZHANG Yi-wen, GUO Rui-feng. Fault-tolerant energy-saving scheduling algorithm base on checkpoint scheme [J]. 吉林大学学报(工学版), 2014, 44(4): 1112-1117.
[7] WANG Hao, ZHANG Xiao, WANG Ping, ZHANG Yang. Lightweight certificateless signature and key agreement scheme for WSNs [J]. 吉林大学学报(工学版), 2014, 44(2): 465-470.
[8] CAI Zhao-hui, ZHANG Jian-pei, YANG Jing. Anonymous area estimation method of path data based on Bayesian network [J]. 吉林大学学报(工学版), 2014, 44(2): 454-458.
[9] HE Zhong-zheng, MEN Chao-guang, LI Xiang. Schedulability of fault-tolerant real-time system based on checkpoint interval optimization [J]. 吉林大学学报(工学版), 2014, 44(2): 433-439.
[10] LUO Wen-jun, GAO Yi-feng. Position-based authentication [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 300-303.
[11] ZHAO Xin,WANG Xiao-dong. Efficient self-adaptive broadcast authentication mechanism in wireless sensor networks [J]. 吉林大学学报(工学版), 2011, 41(03): 758-764.
[12] DING Yong, HU Jian, LI Ya-Hui, WANG Yu-Min. Anonymous broadcast authentication protocol for wireless sensor networks based on bilinear pairing [J]. 吉林大学学报(工学版), 2011, 41(02): 468-0472.
[13] MIAO Feng-Man, ZHANG Qiu-Yu, YUAN Zhan-Ting, ZHANG Qi-Kun, CAI Zhi-Peng. Path choosing and cryptosystem of multitrust domain authentication based on lattice [J]. 吉林大学学报(工学版), 2011, 41(02): 463-0467.
[14] ZHU Jian-qi;LIU Yan-heng;YIN Ke;YANG Zhi-gang . Novel dynamic software copyright protection protocol [J]. 吉林大学学报(工学版), 2009, 39(03): 764-0769.
[15] LIU Wei-jiang, LIU Qing-huai, AN Yu-wei . Construction of Another Cartesian Authentication Code from Odd Characteristic Orthogonal Geometry [J]. 吉林大学学报(工学版), 2000, 30(01): 63-66.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LIU Song-shan, WANG Qing-nian, WANG Wei-hua, LIN Xin. Influence of inertial mass on damping and amplitude-frequency characteristic of regenerative suspension[J]. 吉林大学学报(工学版), 2013, 43(03): 557 -563 .
[2] CHU Liang, WANG Yan-bo, QI Fu-wei, ZHANG Yong-sheng. Control method of inlet valves for brake pressure fine regulation[J]. 吉林大学学报(工学版), 2013, 43(03): 564 -570 .
[3] LI Jing, WANG Zi-han, YU Chun-xian, HAN Zuo-yue, SUN Bo-hua. Design of control system to follow vehicle state with HIL test beach[J]. 吉林大学学报(工学版), 2013, 43(03): 577 -583 .
[4] HU Xing-jun, LI Teng-fei, WANG Jing-yu, YANG Bo, GUO Peng, LIAO Lei. Numerical simulation of the influence of rear-end panels on the wake flow field of a heavy-duty truck[J]. 吉林大学学报(工学版), 2013, 43(03): 595 -601 .
[5] WANG Tong-jian, CHEN Jin-shi, ZHAO Feng, ZHAO Qing-bo, LIU Xin-hui, YUAN Hua-shan. Mechanical-hydraulic co-simulation and experiment of full hydraulic steering systems[J]. 吉林大学学报(工学版), 2013, 43(03): 607 -612 .
[6] ZHANG Chun-qin, JIANG Gui-yan, WU Zheng-yan. Factors influencing motor vehicle travel departure time choice behavior[J]. 吉林大学学报(工学版), 2013, 43(03): 626 -632 .
[7] MA Wan-jing, XIE Han-zhou. Integrated control of main-signal and pre-signal on approach of intersection with double stop line[J]. 吉林大学学报(工学版), 2013, 43(03): 633 -639 .
[8] YU De-xin, TONG Qian, YANG Zhao-sheng, GAO Peng. Forecast model of emergency traffic evacuation time under major disaster[J]. 吉林大学学报(工学版), 2013, 43(03): 654 -658 .
[9] WANG Guo-lin, FU Nai-ji, ZHANG Jian, PEI Zi-rong. Simulation of the radial tire curing process based on K-R kinetic model[J]. 吉林大学学报(工学版), 2013, 43(03): 659 -664 .
[10] XIAO Yun, LEI Jun-qing, ZHANG Kun, LI Zhong-san. Fatigue stiffness degradation of prestressed concrete beam under multilevel amplitude cycle loading[J]. 吉林大学学报(工学版), 2013, 43(03): 665 -670 .