首页> 外文会议>International conference on cloud computing and security >Improved Two-Factor Authentication Protocol Based on Biometric Feature and Password for Cloud Service
【24h】

Improved Two-Factor Authentication Protocol Based on Biometric Feature and Password for Cloud Service

机译:基于生物特征和密码的云服务两要素认证协议的改进

获取原文

摘要

Secure and efficient authentication protocols are necessary for cloud service. Multi-factor authentication protocols taking advantage of smart card, user's password and biometric, are more secure than password-based single-factor authentication protocols which are widely used in practice. However, almost all the existed two-factor authentication protocols and multi-factor authentication protocols are based on smart cards, which will inevitably lead to a series of security problems caused by the loss of smart cards. Recently, Li et al. proposed a two-factor authenticated key agreement protocol based on biometric feature and password innovatively without using smart card. But we demonstrate that Li et al.'s protocol can't resist the privileged-insider attack and the stolen verifier attack. Moreover, their protocol failed to provide user anonymity. To overcome the weaknesses of Li et al.'s scheme, we then proposed an improved two-factor authentication protocol based on the extended Chebyshev chaotic mapping. To illustrate the security of our scheme, we give a standard formal proof with the sequence of games (SOG) technique. Furthermore, we also present a comprehensive heuristic security analysis to demonstrate that the proposed protocol is capable of withstanding all the possible various attacks and provides the desired security features. Compared with other schemes, ours is more secure and efficient.
机译:安全高效的身份验证协议对于云服务是必不可少的。利用智能卡,用户密码和生物识别技术的多因素身份验证协议比在实践中广泛使用的基于密码的单因素身份验证协议更安全。但是,几乎所有存在的两因素认证协议和多因素认证协议都是基于智能卡的,不可避免地会导致由于智能卡丢失而引起的一系列安全问题。最近,李等人。在不使用智能卡的情况下,创新地提出了一种基于生物特征和密码的两因素认证密钥协商协议。但是我们证明了Li等人的协议不能抵抗特权内部攻击和被盗的验证者攻击。而且,他们的协议无法提供用户匿名性。为了克服Li等人方案的弱点,我们然后基于扩展的Chebyshev混沌映射提出了一种改进的两因素身份验证协议。为了说明我们方案的安全性,我们使用游戏序列(SOG)技术给出了标准的形式证明。此外,我们还提出了全面的启发式安全性分析,以证明所提出的协议能够抵御所有可能的各种攻击并提供所需的安全性功能。与其他方案相比,我们的方案更加安全有效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号