| Literature DB >> 26866606 |
Chengqi Wang1, Xiao Zhang1, Zhiming Zheng1.
Abstract
With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.Entities:
Mesh:
Year: 2016 PMID: 26866606 PMCID: PMC4750975 DOI: 10.1371/journal.pone.0149173
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1The mechanism of fuzzy extractor.
Symbols and notions in Mishra et al.’s scheme.
| Symbol | Notion |
|---|---|
| The registration center and adversary | |
| Pre shared key and master secret key | |
| Hash function and biohash function | |
| ⊕, || | XOR operation and concatenation operation |
Fig 2The masquerade attack on Mishra et al.’s scheme.
Fig 3The DoS attack on Mishra et al.’s scheme.
Symbols and notions in our scheme.
| Symbol | Notion |
|---|---|
| The registration center and adversary | |
| Pre shared key and master secret key | |
| Hash function, XOR operation and concatenation operation |
Fig 4The server registration phase.
Fig 5The user registration phase.
Fig 6The login phase.
Fig 7The authentication phase.
Algorithm .
| 1. Eavesdrop the login request message { |
| 2. Apply the oracle |
| 3. |
| 4. Calculate |
| 5. Apply the oracle |
| 6. Eavesdrop the authentication request message { |
| 7. Further apply the oracle |
| 8. |
| 9. Calculate |
| 10. Apply the oracle |
| 11. |
| 12. Calculate |
| 13. Accept |
| 14. |
| 15. |
| 16. |
| 17. |
| 18. |
| 19. |
| 20. |
| 21. |
| 22. |
| 23. |
Algorithm .
| 1. Extract all the information { |
| 2. Apply the oracle |
| 3. Eavesdrop the login request message { |
| 4. Apply the oracle |
| 5. Calculate |
| 6. |
| 7. Apply the oracle |
| 8. Accept |
| 9. |
| 10. |
| 11. |
| 12. |
The resistance comparison.
| Chuang et al.’s [ | Mishra et al.’s [ | Xue et al.’s [ | Li et al.’s [ | Ours | |
|---|---|---|---|---|---|
| R1 | No | No | No | No | Yes |
| R2 | Yes | Yes | Yes | Yes | Yes |
| R3 | Yes | Yes | No | No | Yes |
| R4 | Yes | Yes | No | No | Yes |
| R5 | Yes | Yes | Yes | Yes | Yes |
| R6 | Yes | Yes | No | Yes | Yes |
| R7 | No | No | No | No | Yes |
| R8 | No | Yes | Yes | No | Yes |
| R9 | No | Yes | Yes | Yes | Yes |
| R10 | No | No | Yes | Yes | Yes |
| R11 | Yes | Yes | No | Yes | Yes |
The functionality comparison.
| Chuang et al.’s [ | Mishra et al.’s [ | Xue et al.’s [ | Li et al.’s [ | Lu et al.’s [ | Ours | |
|---|---|---|---|---|---|---|
| F1 | Yes | Yes | Yes | Yes | Yes | Yes |
| F2 | No | Yes | Yes | Yes | Yes | Yes |
| F3 | Yes | Yes | Yes | Yes | Yes | Yes |
| F4 | No | No | Yes | Yes | Yes | Yes |
| F5 | No | No | No | No | No | Yes |
| F6 | No | Yes | No | No | Yes | Yes |
The computation cost comparison.
| Chuang et al.’s [ | Mishra et al.’s [ | Xue et al.’s [ | Li et al.’s [ | Lu et al.’s [ | Ours | |
|---|---|---|---|---|---|---|
| S1 | 4 | 7 | 5 | 7 | 4 | 4 |
| S2 | 0.8ms | 1.4ms | 1.0ms | 1.4ms | 1.0ms | 0.8ms |
| S3 | 13 | 11 | 14 | 16 | 13 | 11 |
| S4 | 2.6ms | 2.2ms | 2.8ms | 3.2ms | 2.6ms | 2.2ms |
| S5 | 3.4ms | 3.6ms | 3.8ms | 4.6ms | 3.6ms | 3.0ms |
Fig 8The computation cost comparison.
The communication and storage costs comparison.
| Chuang et al.’s [ | Mishra et al.’s [ | Xue et al.’s [ | Li et al.’s [ | Lu et al.’s [ | Ours | |
|---|---|---|---|---|---|---|
| C1 | 80bytes | 80bytes | 83bytes | 80bytes | 82bytes | 102bytes |
| C2 | 80bytes | 80bytes | 259bytes | 60bytes | 64bytes | 80bytes |
| C3 | 160bytes | 160bytes | 342bytes | 140bytes | 146bytes | 182bytes |
| C4 | 80bytes | 100bytes | 60bytes | 100bytes | 60bytes | 100bytes |
Fig 9The communication and storage costs comparison.