| Literature DB >> 29121050 |
Hua Guo1, Pei Wang1,2, Xiyong Zhang3, Yuanfei Huang2, Fangchao Ma4.
Abstract
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.Entities:
Mesh:
Year: 2017 PMID: 29121050 PMCID: PMC5679566 DOI: 10.1371/journal.pone.0187403
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Notations.
| Notations | Description |
|---|---|
| An | |
| Application server | |
| Registration server | |
| Identity of | |
| Password of | |
| smart card | |
| Identity of | |
| Secret keys chosen by | |
| Encryption and decryption operations | |
|
| Public and private keys of |
| Random numbers chosen by | |
| A secure one-way hash function | |
| A bio-hash function | |
| ⊕ | An exclusive-OR operation |
| || | The concatenation operation |
Table 1 summarizes the notations used in this paper.
Fig 1Registration and authentication phases of Moon et al.’s scheme.
Registration and authentication phases of Moon et al.’s scheme.
Fig 2Registration and authentication phases of our scheme.
Registration and authentication phases of our scheme.
BAN logic notations.
| Notations | Description |
|---|---|
| # | |
|
| |
| ( | The formula |
| { | The formula |
|
|
Functionality comparison.
| Scheme | Chuang [ | Mishra [ | Lu [ | Lu [ | Moon [ | our |
|---|---|---|---|---|---|---|
| Provide mutual authentication | No | Yes | Yes | Yes | Yes | Yes |
| User anonymity | Yes | Yes | No | No | No | Yes |
| Resist insider attack | Yes | Yes | Yes | Yes | No | Yes |
| Resist off-line guessing attack | Yes | Yes | Yes | Yes | No | Yes |
| Resist smart card theft attack | No | Yes | Yes | Yes | Yes | Yes |
| Resist replay attack | No | No | No | Yes | Yes | Yes |
| Resist Impersonation attack | No | No | No | No | No | Yes |
| Session key agreement | Yes | Yes | Yes | Yes | Yes | Yes |
| Provides Forward secrecy | Yes | No | Yes | Yes | Yes | Yes |
| Efficient password change phase | No | No | Yes | Yes | Yes | Yes |
| Resist verifier attack | Yes | Yes | Yes | Yes | Yes | Yes |
Computation costs comparison.
| Scheme | Login | Authentication | Total | Time(ms) |
|---|---|---|---|---|
| Chuang | 4 | 13 | 17 | 0.0391 |
| Mishra | 4 | 11 | 15 | 0.0345 |
| Lu | 6 | 12 | 18 | 0.0414 |
| Moon | 5 | 13 | 18 | 0.0414 |
| Lu | 4 | 14 | 18 | 12.1689 |
| Mishra’s [ | 6 | 10 | 16 | 6.7148 |
| Chaudhry’s [ | 2 | 6 | 8 | 17.8504 |
| Jiang’s [ | 3 | 6 | 9 | 13.9159 |
| our scheme | 7 | 11 | 18 | 4.0866 |