首页> 美国卫生研究院文献>Sensors (Basel Switzerland) >A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography
【2h】

A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography

机译:椭圆曲线密码学的不可追踪性多服务器两要素认证方案

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

To provide secure communication, the authentication-and-key-agreement scheme plays a vital role in multi-server environments, Internet of Things (IoT), wireless sensor networks (WSNs), etc. This scheme enables users and servers to negotiate for a common session initiation key. Our proposal first analyzes Amin et al.’s authentication scheme based on RSA and proves that it cannot provide perfect forward secrecy and user un-traceability, and is susceptible to offline password guessing attack and key-compromise user impersonation attack. Secondly, we provide that Srinivas et al.’s multi-server authentication scheme is not secured against offline password guessing attack and key-compromise user impersonation attack, and is unable to ensure user un-traceability. To remedy such limitations and improve computational efficiency, we present a multi-server two-factor authentication scheme using elliptic curve cryptography (ECC). Subsequently, employing heuristic analysis and Burrows–Abadi–Needham logic (BAN-Logic) proof, it is proven that the presented scheme provides security against all known attacks, and in particular provides user un-traceability and perfect forward security. Finally, appropriate comparisons with prevalent works demonstrate the robustness and feasibility of the presented solution in multi-server environments.
机译:为了提供安全的通信,身份验证和密钥协商方案在多服务器环境,物联网(IoT),无线传感器网络(WSN)等中起着至关重要的作用。该方案使用户和服务器能够协商公用会话启动密钥。我们的提案首先分析了Amin等基于RSA的身份验证方案,并证明它不能提供完美的前向保密性和用户不可追溯性,并且容易受到离线密码猜测攻击和密钥泄露用户假冒攻击的影响。其次,我们提供了Srinivas等人的多服务器身份验证方案无法防止离线密码猜测攻击和密钥泄露用户假冒攻击,并且不能确保用户无法追溯。为了弥补这些限制并提高计算效率,我们提出了一种使用椭圆曲线密码术(ECC)的多服务器两因素身份验证方案。随后,采用启发式分析和Burrows-Abadi-Needham逻辑(BAN-Logic)证明,证明了该方案可提供针对所有已知攻击的安全性,尤其是可提供用户不可追溯性和完美的前向安全性。最后,与流行的作品进行适当的比较证明了所提出的解决方案在多服务器环境中的鲁棒性和可行性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号