| Literature DB >> 30893354 |
Kyongsok Pak1, Songho Pak1, Cholman Ho1, Myongsuk Pak1, Choljin Hwang1.
Abstract
Three-party authentication key exchange (3PAKE) is a protocol that allows two users to set up a common session key with the help of a trusted remote server, which is effective for secret communication between clients in a large-scale network environment. Since chaotic maps have superior characteristics, researchers have recently presented some of the studies that apply it to authentication key exchange and cryptography. Providing user anonymity in the authentication key exchange is one of the important security requirements to protect users' personal secrets. We analyse Lu et al.'s scheme which attempts to provide user anonymity and we prove that his scheme has errors in the key exchange phase and password change phase. We propose a round-effective three-party authentication key exchange (3PAKE) protocol that provides user anonymity and we analyse its security properties based on BAN logic and AVISPA tool.Entities:
Mesh:
Year: 2019 PMID: 30893354 PMCID: PMC6426243 DOI: 10.1371/journal.pone.0213976
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Notation used in proposed scheme.
| Notation | Description |
|---|---|
| IDS | Identifier of trusted server S |
| SCA, SCB | smart card of user A and B |
| IDA, IDB | Identifier of user A and B |
| pwA, pwB | Password of A and B |
| bmA, bmB | Biometrics of A and B |
| s | Private key of S |
| p | A large prime number chosen by S |
| x | seed of Chebyshev polynomials. x ∈ Zp |
| Tn(x) | Chebyshev polynomials of degree n |
| KS | S’s public-key (KS = Ts(x)) |
| H(∙) | One-way hash function (0,1)* → (0, 1)n |
| h(∙) | Bio-hashing function |
| EK(∙) | Symmetric encrypt algorithm with secret key K |
| DK(∙) | Symmetric decrypt algorithm with secret key K |
| || | String concatenation operator |
| ⊕ | XOR operator |
Fig 1User registration phase of the proposed scheme.
Fig 2Authentication and session key exchange phase of the proposed scheme.
Fig 3Role specification in HLPSL for the user A.
Fig 4Role specification in HLPSL for the user B.
Fig 5Role specification in HLPSL for the server S.
Fig 6Role specification in HLPSL for the session, environment and goal.
Fig 7The result of the analysis using OFMC back-end.
Fig 8The result of the analysis using CL-AtSe back-end.
Comparison of the computational cost between the proposed scheme and other 3PAKE scheme.
| Xie et al.[ | Lu et al.[ | Li et al.[ | Amin et al.[ | Islam et al.[ | proposed | |
|---|---|---|---|---|---|---|
| A | 3te + 2ts + 4th | 3tc + 4ts + 4th | 4tc + 1tm + 5th | 8th | 2tc + 4ts + 2th | 3tc + 2ts + 6th |
| B | 3te + 2ts + 5th | 2tc + 3ts + 5th | 4tc + 1tm + 5th | 9th | 2tc + 4ts + 2th | 3tc + 2ts + 6th |
| S | 2te + 4ts + 7th | 5tc + 5ts+ 7th | 4tc + 2tq + 5th | 10th | 4ts + 3th | 2tc + 4ts + 6th |
| Total | 8te + 8ts+16th | 10tc + 12ts+ 16th | 12tc+2tm+2tq+15th | 27th | 4tc + 12ts + 7th | 8tc + 8ts + 18th |
| Round | 4 | 5 | 6 | 4 | 4 | 4 |
| Messages | 5 | 7 | 6 | 6 | 8 | 4 |
Comparative evaluation of the security function between the proposed scheme and other 3PAKE schemes.
| Xie et al.[ | Lu et al.[ | Li et al.[ | Amin et al.[ | Islam et al.[ | proposed | |
|---|---|---|---|---|---|---|
| Provision of User anonymity | Yes | No | Yes | No | No | Yes |
| Protection of Privileged insider attack | No | Yes | Yes | No | Yes | Yes |
| Protection of password guessing attack | Yes | Yes | Yes | Yes | Yes | Yes |
| Protection of User impersonate attack | Yes | Yes | Yes | Yes | Yes | Yes |
| Provision of Password change phase | No | Yes | Yes | Yes | Yes | Yes |
| Secrecy of Password change phase | - | No | Yes | Yes | Yes | Yes |
| Password change without server’s help | - | No | No | Yes | Yes | Yes |
| Without timestamp | Yes | Yes | Yes | Yes | No | Yes |
| Using smart card | No | No | No | Yes | Yes | Yes |