| Literature DB >> 30300362 |
Shudong Li1,2, Xiaobo Wu3, Dawei Zhao4, Aiping Li2, Zhihong Tian1, Xiaodong Yang5.
Abstract
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication scheme for multi-server environments. They claimed that their scheme can resist several types of attacks. However, through careful analysis, we find that Li et al.'s scheme is vulnerable to stolen smart card and off-line dictionary attacks, replay attacks, impersonation attacks and server spoofing attacks. By analyzing other similar schemes, we find that a certain type of dynamic ID-based multi-server authentication scheme in which only hash functions are used and whereby no registration center participates in the authentication and session key agreement phase faces difficulties in providing perfectly efficient and secure authentication. To compensate for these shortcomings, we propose a novel dynamic ID-based remote user authentication scheme for multi-server environments based on pairing and self-certified public keys. Security and performance analyses show that the proposed scheme is secure against various attacks and has many excellent features.Entities:
Mesh:
Year: 2018 PMID: 30300362 PMCID: PMC6177128 DOI: 10.1371/journal.pone.0202657
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Notations used in the proposed scheme.
| A bilinear map, | |
| The | |
| The identity of the user | |
| The | |
| The identity of the service provider server | |
| The registration center. | |
| The master secret key of the registration center | |
| The public key of | |
| A generator of group | |
| A map-to-point function, | |
| A one-way hash function, | |
| ⊕ | A simple XOR operation in |
| ∥ | The concatenation operation. |
Fig 1User and server registration phases of the proposed scheme.
Fig 2Login phase and authentication and session key agreement phase.
Fig 3Password change phase of the proposed scheme.
Computational cost comparison of our scheme with other schemes.
| Proposed scheme | Liao et al.’scheme [ | Tseng et al.’scheme [ | |
|---|---|---|---|
| C1 | 3 | 3 | 2 |
| C2 | 8 | 5 | 3 |
| C3 | 2 | 2 | 2 |
Functionality comparisons among related multi-server authentication protocols.
| Proposed scheme | Liao et al. [ | Tseng et al. [ | Li et al. [ | Lee et al. [ | Shao et al. [ | Lee et al. [ | |
|---|---|---|---|---|---|---|---|
| Resist stolen smart card and offline dictionary attacks | Yes | No | No | No | No | No | No |
| Resist replay attacks | Yes | Yes | Yes | No | No | No | No |
| Resist impersonation attacks | Yes | Yes | Yes | No | No | No | No |
| Resist server spoofing attacks | Yes | Yes | No | No | No | No | No |
| Resist insider attacks | Yes | Yes | No | Yes | Yes | No | Yes |
| Resist denial of service attacks | Yes | No | Yes | Yes | Yes | Yes | No |
| Perfect forwarding secrecy | Yes | Yes | No | Yes | Yes | No | No |
| Ensure user’s anonymity | Yes | No | No | Yes | Yes | No | Yes |
| No verification table | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Local password verification | Yes | No | Yes | Yes | Yes | Yes | No |
| Proper mutual authentication | Yes | Yes | No | Yes | No | Yes | Yes |