| Literature DB >> 26709702 |
Jongho Moon1, Younsung Choi1, Jaewook Jung1, Dongho Won1.
Abstract
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.Entities:
Mesh:
Year: 2015 PMID: 26709702 PMCID: PMC4699843 DOI: 10.1371/journal.pone.0145263
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Notations used in Lu et al.’s scheme.
|
| User and a server |
|
| The registration center |
|
| Identity of |
|
| Password and a biometrics of |
|
| Secret number selected by the |
|
| Secure key shared by the |
|
| Timestamp |
|
| One-way hash function |
|
| Biohash function |
| ⊕, ∥ | Exclusive-or operation and concatenation operation |
Fig 1Our proposed authentication and key agreement protocol for multi-server environments.
Notations used in our proposed scheme.
|
| The |
|
| The |
|
| The smart card of the |
|
| The registration center |
|
| Identity of the |
|
| Identity of the |
|
| Password of the |
|
| Biometrics of the |
|
| A secret number selected by |
|
| A random number unique to user selected by |
|
| Secure key pre-shared by |
|
| A timestamp |
|
| A one-way hash function |
|
| Biohash function |
| ⊕, ∥ | Exclusive-or operation and concatenation operation |
Notations used in BAN Logic.
|
| The principal |
|
| The formula |
|
| The principal |
|
| The principals |
|
| The principal |
|
| The principal |
|
| The formula |
|
| The formula |
|
| The formula |
|
| The formula |
Algorithm .
| 1. Eavesdrop login request message { |
| 2. Call the Reveal oracle. Let |
| 3. Eavesdrop login response message { |
| 4. Call the Reveal oracle. Let |
| 5. |
| 6. Call the Reveal oracle. Let |
| 7. Call the Reveal oracle. Let |
| 8. Compute |
| 9. |
| 10. Call the Reveal oracle. Let |
| 11. Compute |
| 12. |
| 13. Call the Reveal oracle. Let |
| 14. Accept |
| 15. |
| 16. |
| 17. |
| 18. |
| 19. |
| 20. |
| 21. |
| 22. |
| 23. |
| 24. |
Functionality comparison.
| Ours | [23] | [22] | [21] | [20] | [19] | [18] | |
|---|---|---|---|---|---|---|---|
| Provide mutual authentication | Yes | Yes | Yes | No | Yes | Yes | Yes |
| User anonymity | Yes | No | Yes | Yes | Yes | Yes | Yes |
| Resist insider attack | Yes | Yes | Yes | Yes | Yes | No | Yes |
| Resist off-line guessing attack | Yes | Yes | Yes | Yes | Yes | No | Yes |
| Resist stolen smart card attack | Yes | No | Yes | No | - | Yes | Yes |
| Resist replay attack | Yes | Yes | No | No | No | No | No |
| Resist verifier attack | Yes | Yes | Yes | Yes | - | No | Yes |
| Session key agreement | Yes | No | Yes | Yes | Yes | No | Yes |
| Efficient password change phase | Yes | Yes | No | No | Yes | No | No |
Computational costs comparison.
| Schemes | Registration | Login | Authentication | Total | Time(ms) |
|---|---|---|---|---|---|
| Li et al. [ | 6 | 6 | 12 | 24 | 4.8 |
| Xue et al. [ | 7 | 6 | 17 | 30 | 6.0 |
| Lu et al. [ | 6 | 5 | 13 | 24 | 4.8 |
| Chuang et al. [ | 3 | 4 | 13 | 20 | 4.0 |
| Mishra et al. [ | 7 | 4 | 11 | 22 | 4.4 |
| Lu et al. [ | 5 | 6 | 12 | 23 | 4.6 |
| Our proposed | 5 | 5 | 13 | 23 | 4.6 |
T : hash function evaluation