| Literature DB >> 36112633 |
Kyong-Sok Pak1, Mi-Hyang Kim1, Song-Ho Pak1, Chol-Man Ho1.
Abstract
Three-party authentication key exchange is a protocol that allows two users to set up a session key for encrypted communication by the help of a trusted remote server. Providing user anonymity and mutual authentication in the authentication key exchange is important security requirements to protect users' privacy and enhance its security performance. Recently Li proposed a chaotic maps-based authentication key exchange protocol which attempts to provide mutual authentication and user anonymity, but we found that there were some faults in the key exchange phase and password change phase of his scheme. We prove that Li's scheme does not provide user anonymity and that the user's privacy information is disclosed, and propose enhanced three-party authentication key exchange protocol that provides user anonymity and we analyse its security properties and verify its validity based on BAN logic and AVISPA tool.Entities:
Mesh:
Year: 2022 PMID: 36112633 PMCID: PMC9481006 DOI: 10.1371/journal.pone.0273664
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.752
Notations in Li et al.’s scheme.
| Notation | Description |
|---|---|
| Trusted remote server and two users | |
|
| Identifier of user |
|
| Password of user |
|
| Secret key of |
|
| A large prime number chosen by |
| Two large primes maintained by | |
|
| A large prime number chosen by |
| Chebyshev polynomials of degree | |
| One-way hash function | |
| Modular squaring operation and square root modulo operation | |
| ⊕ | XOR operator |
Notations in the proposed scheme.
| Notation | Description |
|---|---|
| Trusted remote server and two users | |
|
| Smart card of user |
|
| Identifier of user |
|
| Password of user |
|
| Biometrics of user |
| Private and public key of | |
| Random numbers chosen by | |
|
| A large prime number chosen by |
| Chebyshev polynomials of degree | |
| One-way hash function (0,1)* → (0, 1)n | |
| Bio-hashing function | |
| Symmetric encrypt and decrypt algorithm with secret key | |
| || | String concatenation operator |
| ⊕ | XOR operator |
Fig 1User registration phase.
Fig 2Authentication and session key exchange phase of the proposed scheme.
Shows some notations and rules of BAN logic.
| Notation | Description |
|---|---|
| #( | |
|
| |
| { | Formula |
| < | |
|
| Message-meaning rule |
|
| Nonce-verification rule |
|
| Jurisdiction rule |
|
| Freshness rule |
|
| Belief rule |
|
| See rule |
|
| Hash function rule |
Fig 3Role specification in HLPSL for the user A.
Fig 5Role specification in HLPSL for the server S.
Fig 6Role specification in HLPSL for the session, environment and goal.
Fig 7The result of the analysis using OFMC back-end.
Fig 8The result of the analysis using CL-AtSe back-end.
Comparison of the computational cost between the proposed scheme and other 3PAKE schemes.
| Irshad et al. [ | Jabbari et al. [ | Li et al. [ | Lu et al. [ | proposed | |
|---|---|---|---|---|---|
| A | 3tc + 10th | 4tc + 2ts + 4th | 4tc + 1tr + 5th | 3tc + 4ts + 4th | 3tc + 2ts + 9th |
| B | 3tc + 1ts + 10th | 3tc + 2ts + 4th | 4tc + 1tr + 5th | 2tc + 3ts + 5th | 3tc + 2ts + 7th |
| S | 2tc + 1ts + 10th | 4tc +4ts + 4th | 4tc + 2tq + 5th | 5tc + 5ts+ 7th | 2tc + 4ts + 8th |
| Total | 8tc + 2ts + 30th | 11tc + 8ts + 12th | 12tc+2tm+2tq+15th | 10tc + 12ts+ 16th | 8tc + 8ts + 24th |
| Round | 5 | 5 | 6 | 6 | 7 |
Communication overhead of our proposed scheme.
| Expression | Length of message | |
|---|---|---|
| M1 | 2|ID| + |H| + |T| | 640 |
| M2 | |H| +|N| | 320 |
| M3 | |H| +|N| | 320 |
| M4 | |ID| + |N| + 2|H| + |T| | 800 |
| M5 | 2|ID| + 2|N| + 2|H| + 2|T| | 1280 |
| M6 | |ID| + |N| + 2|H| + |T| | 800 |
| M7 | |H| | 160 |
| Total | 6|ID| + 6|N| + 10|H| + 5|T| | 4320 |
Comparison of the computational cost between the proposed scheme and other 3PAKE schemes.
| Irshad et al. [ | Jabbari et al. [ | Li et al. [ | Lu et al. [ | proposed | |
|---|---|---|---|---|---|
| Expression | |Ts|+14|H| +6|T| | 11|ID|+8|H| +9|T| | 2|ME|+6|H|+5|T| | 6|ID|+7|H|+7|T| | 6|ID|+6|N|+ 10|H| + 5|T| |
| Bits | 3232 | 4480 | 3808 | 3200 | 4320 |
Comparative evaluation of the security function between the proposed scheme and other 3PAKE schemes.
| Irshad et al. [ | Jabbari et al. [ | Li et al. [ | Lu et al. [ | proposed | |
|---|---|---|---|---|---|
| Mutual authentication | Yes | Yes | Yes | Yes | Yes |
| Provision of User anonymity | Yes | Yes | No | No | Yes |
| Provision of untraceability | No | Yes | No | No | Yes |
| Protection of Privileged insider attack | Yes | Yes | Yes | Yes | Yes |
| Protection of stolen verifier attack | Yes | Yes | No | Yes | Yes |
| Protection of User impersonate attack | Yes | Yes | No | Yes | Yes |
| Protection of verifier disclose attack | Yes | Yes | No | Yes | Yes |
| Provision of Password change phase | Yes | Yes | Yes | Yes | Yes |
| Provision of re-registration phase | No | No | No | No | Yes |
| Without timestamp | Yes | Yes | Yes | Yes | Yes |
| Using smart card | Yes | No | No | No | Yes |