메뉴 건너뛰기




Volumn 9, Issue 12, 2014, Pages 2302-2313

An efficient generic framework for three-factor authentication with provably secure instantiation

Author keywords

Authentication; biometrics; password; privacy; security; smart card

Indexed keywords

AUTHENTICATION; BIOMETRICS; DATA PRIVACY; NETWORK SECURITY; SMART CARDS;

EID: 84911059606     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2362979     Document Type: Article
Times cited : (81)

References (47)
  • 1
  • 2
    • 84868090556 scopus 로고    scopus 로고
    • Provably secure single sign-on scheme in distributed systems and networks
    • Jun
    • J. Yu, G. Wang, and Y. Mu, "Provably secure single sign-on scheme in distributed systems and networks," in Proc. IEEE 11th TrustCom, Jun. 2012, pp. 271-278.
    • (2012) Proc. IEEE 11th TrustCom , pp. 271-278
    • Yu, J.1    Wang, G.2    Mu, Y.3
  • 3
    • 84871821096 scopus 로고    scopus 로고
    • Security analysis of a single sign-on mechanism for distributed computer networks
    • Feb
    • G. Wang, J. Yu, and Q. Xie, "Security analysis of a single sign-on mechanism for distributed computer networks," IEEE Trans. Ind. Informat., vol. 9, no. 1, pp. 294-302, Feb. 2013.
    • (2013) IEEE Trans. Ind. Informat. , vol.9 , Issue.1 , pp. 294-302
    • Wang, G.1    Yu, J.2    Xie, Q.3
  • 4
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov
    • L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 5
    • 0026153410 scopus 로고
    • Remote password authentication with smart cards
    • May
    • C.-C. Chang and T.-C. Wu, "Remote password authentication with smart cards," IEE Proc.-E Comput. Digital Techn., vol. 138, no. 3, pp. 165-168, May 1991.
    • (1991) IEE Proc.-E Comput. Digital Techn. , vol.138 , Issue.3 , pp. 165-168
    • Chang, C.-C.1    Wu, T.-C.2
  • 7
    • 3042781449 scopus 로고    scopus 로고
    • Toward reliable user authentication through biometrics
    • May/Jun
    • V. Matyas, Jr., and Z. Ríha, "Toward reliable user authentication through biometrics," IEEE Security Privacy, vol. 1, no. 3, pp. 45-49, May/Jun. 2003.
    • (2003) IEEE Security Privacy , vol.1 , Issue.3 , pp. 45-49
    • Matyas, V.1    Ríha, Z.2
  • 8
    • 84891752344 scopus 로고    scopus 로고
    • Smart environment as a service: Three factor cloud based user authentication for telecare medical information system
    • Z. Siddiqui, A.-H. Abdullah, M. K. Khan, and A. S. Alghamdi, "Smart environment as a service: Three factor cloud based user authentication for telecare medical information system," J. Med. Syst., vol. 38, no. 1, pp. 1-14, 2014.
    • (2014) J. Med. Syst. , vol.38 , Issue.1 , pp. 1-14
    • Siddiqui, Z.1    Abdullah, A.-H.2    Khan, M.K.3    Alghamdi, A.S.4
  • 9
    • 0033350090 scopus 로고    scopus 로고
    • Password authentication schemes with smart cards
    • W.-H. Yang and S.-P. Shieh, "Password authentication schemes with smart cards," Comput. Security, vol. 18, no. 8, pp. 727-733, 1999.
    • (1999) Comput. Security , vol.18 , Issue.8 , pp. 727-733
    • Yang, W.-H.1    Shieh, S.-P.2
  • 10
    • 0036429021 scopus 로고    scopus 로고
    • An enhancement of timestamp-based password authentication scheme
    • L. Fan, J.-H. Li, and H.-W. Zhu, "An enhancement of timestamp-based password authentication scheme," Comput. Security, vol. 21, no. 7, pp. 665-667, 2002.
    • (2002) Comput. Security , vol.21 , Issue.7 , pp. 665-667
    • Fan, L.1    Li, J.-H.2    Zhu, H.-W.3
  • 11
    • 0242552286 scopus 로고    scopus 로고
    • Security enhancement for the timestamp-based password authentication scheme using smart cards
    • J.-J. Shena, C.-W. Linb, and M.-S. Hwang, "Security enhancement for the timestamp-based password authentication scheme using smart cards," Comput. Security, vol. 22, no. 7, pp. 591-595, 2003.
    • (2003) Comput. Security , vol.22 , Issue.7 , pp. 591-595
    • Shena, J.-J.1    Linb, C.-W.2    Hwang, M.-S.3
  • 12
    • 12244291938 scopus 로고    scopus 로고
    • An improvement of the Yang-Shieh password authentication schemes
    • C.-C. Yanga, R.-C. Wang, and T.-Y. Chang, "An improvement of the Yang-Shieh password authentication schemes," Appl. Math. Comput., vol. 162, no. 3, pp. 1391-1396, 2005.
    • (2005) Appl. Math. Comput. , vol.162 , Issue.3 , pp. 1391-1396
    • Yanga, C.-C.1    Wang, R.-C.2    Chang, T.-Y.3
  • 13
    • 26844467695 scopus 로고    scopus 로고
    • Security enhancement for password authentication schemes with smart cards
    • E.-J. Yoon, W.-H. Kim, and K.-Y. Yoo, "Security enhancement for password authentication schemes with smart cards," in Proc. TrustBus, 2005, pp. 311-320.
    • (2005) Proc. TrustBus , pp. 311-320
    • Yoon, E.-J.1    Kim, W.-H.2    Yoo, K.-Y.3
  • 14
    • 0036167785 scopus 로고    scopus 로고
    • Cryptanalysis of timestamp-based password authentication scheme
    • C.-K. Chan and L.-M. Cheng, "Cryptanalysis of timestamp-based password authentication scheme," Comput. Security, vol. 21, no. 1, pp. 74-76, 2002.
    • (2002) Comput. Security , vol.21 , Issue.1 , pp. 74-76
    • Chan, C.-K.1    Cheng, L.-M.2
  • 15
    • 85007377325 scopus 로고    scopus 로고
    • Cryptanalysis of timestamp-based password authentication schemes using smart cards
    • G. Wang and F. Bao, "Cryptanalysis of timestamp-based password authentication schemes using smart cards," in Proc. ICICS, 2006, pp. 399-409.
    • (2006) Proc. ICICS , pp. 399-409
    • Wang, G.1    Bao, F.2
  • 16
    • 23344449693 scopus 로고    scopus 로고
    • ID-based password authentication scheme using smart cards and fingerprints
    • Oct
    • H.-S. Kim, S.-W. Lee, and K.-Y. Yoo, "ID-based password authentication scheme using smart cards and fingerprints," SIGOPS Oper. Syst. Rev., vol. 37, no. 4, pp. 32-41, Oct. 2003.
    • (2003) SIGOPS Oper. Syst. Rev. , vol.37 , Issue.4 , pp. 32-41
    • Kim, H.-S.1    Lee, S.-W.2    Yoo, K.-Y.3
  • 17
    • 33645758252 scopus 로고    scopus 로고
    • Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints
    • Apr
    • M. Scott, "Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints," SIGOPS Oper. Syst. Rev., vol. 38, no. 2, pp. 73-75, Apr. 2004.
    • (2004) SIGOPS Oper. Syst. Rev. , vol.38 , Issue.2 , pp. 73-75
    • Scott, M.1
  • 18
    • 10044222391 scopus 로고    scopus 로고
    • Biometric cryptosystems: Issues and challenges
    • Jun
    • U. Uludag, S. Pankanti, A. K. Jain, and S. Prabhakar, "Biometric cryptosystems: Issues and challenges," Proc. IEEE, vol. 92, no. 6, pp. 948-960, Jun. 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 948-960
    • Uludag, U.1    Pankanti, S.2    Jain, A.K.3    Prabhakar, S.4
  • 22
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Berlin, Germany: Springer-Verlag
    • T. P. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1991, pp. 129-140.
    • (1991) Advances in Cryptology , pp. 129-140
    • Pedersen, T.P.1
  • 23
    • 70450285606 scopus 로고    scopus 로고
    • Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics
    • Dec
    • C.-I. Fan and Y.-H. Lin, "Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 933-945, Dec. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.4 , pp. 933-945
    • Fan, C.-I.1    Lin, Y.-H.2
  • 24
    • 84859300639 scopus 로고    scopus 로고
    • Satisfying privacy requirements before data anonymization
    • X. Sun, H. Wang, J. Li, and Y. Zhang, "Satisfying privacy requirements before data anonymization," Comput. J., vol. 55, no. 4, pp. 422-437, 2012.
    • (2012) Comput. J. , vol.55 , Issue.4 , pp. 422-437
    • Sun, X.1    Wang, H.2    Li, J.3    Zhang, Y.4
  • 25
    • 84872696068 scopus 로고    scopus 로고
    • Privacy preserving data sharing with anonymous ID assignment
    • Feb
    • L. A. Dunning and R. Kresman, "Privacy preserving data sharing with anonymous ID assignment," IEEE Trans. Inf. Forensics Security, vol. 8, no. 2, pp. 402-413, Feb. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.2 , pp. 402-413
    • Dunning, L.A.1    Kresman, R.2
  • 26
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • Jan
    • C.-T. Li and M.-S. Hwang, "An efficient biometrics-based remote user authentication scheme using smart cards," J. Netw. Comput. Appl., vol. 33, no. 1, pp. 1-5, Jan. 2010.
    • (2010) J. Netw. Comput. Appl. , vol.33 , Issue.1 , pp. 1-5
    • Li, C.-T.1    Hwang, M.-S.2
  • 27
    • 78649335192 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
    • X. Li, J.-W. Niu, J. Ma, W.-D. Wang, and C.-L. Liu, "Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards," J. Netw. Comput. Appl., vol. 34, no. 1, pp. 73-79, 2011.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 73-79
    • Li, X.1    Niu, J.-W.2    Ma, J.3    Wang, W.-D.4    Liu, C.-L.5
  • 28
    • 84860585173 scopus 로고    scopus 로고
    • Cryptanalysis and further improvement of a biometric-based remote user authentication scheme using smart cards
    • A. K. Das, "Cryptanalysis and further improvement of a biometric-based remote user authentication scheme using smart cards," Int. J. Netw. Security Appl., vol. 3, no. 2, pp. 13-28, 2011.
    • (2011) Int. J. Netw. Security Appl. , vol.3 , Issue.2 , pp. 13-28
    • Das, A.K.1
  • 29
    • 79959689122 scopus 로고    scopus 로고
    • A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
    • Aug
    • X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. H. Deng, "A generic framework for three-factor authentication: Preserving security and privacy in distributed systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 8, pp. 1390-1397, Aug. 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.8 , pp. 1390-1397
    • Huang, X.1    Xiang, Y.2    Chonka, A.3    Zhou, J.4    Deng, R.H.5
  • 30
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Berlin, Germany: Springer-Verlag
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2004, pp. 523-540.
    • (2004) Advances in Cryptology , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 31
    • 78349280706 scopus 로고    scopus 로고
    • Transforming a pattern identifier into biometric key generators
    • Jul
    • Y. Wu and B. Qiu, "Transforming a pattern identifier into biometric key generators," in Proc. IEEE ICME, Jul. 2010, pp. 78-82.
    • (2010) Proc. IEEE ICME , pp. 78-82
    • Wu, Y.1    Qiu, B.2
  • 32
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • D. He, M. Ma, Y. Zhang, C. Chen, and J. Bu, "A strong user authentication scheme with smart cards for wireless communications," Comput. Commun., vol. 34, no. 3, pp. 367-374, 2011.
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 367-374
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.5
  • 35
    • 36348986198 scopus 로고    scopus 로고
    • Fingerprint-based fuzzy vault: Implementation and performance
    • Dec
    • K. Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based fuzzy vault: Implementation and performance," IEEE Trans. Inf. Forensics Security, vol. 2, no. 4, pp. 744-757, Dec. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.4 , pp. 744-757
    • Nandakumar, K.1    Jain, A.K.2    Pankanti, S.3
  • 36
    • 33845532978 scopus 로고    scopus 로고
    • Securing fingerprint template: Fuzzy vault with helper data
    • Jun
    • U. Uludag and A. Jain, "Securing fingerprint template: Fuzzy vault with helper data," in Proc. CVPR Workshop, Jun. 2006, p. 163.
    • (2006) Proc. CVPR Workshop , pp. 163
    • Uludag, U.1    Jain, A.2
  • 38
    • 34548048416 scopus 로고    scopus 로고
    • Combining minutiae descriptors for fingerprint matching
    • J. Feng, "Combining minutiae descriptors for fingerprint matching," Pattern Recognit., vol. 41, no. 1, pp. 342-352, 2008.
    • (2008) Pattern Recognit. , vol.41 , Issue.1 , pp. 342-352
    • Feng, J.1
  • 39
    • 51249124719 scopus 로고    scopus 로고
    • Secure biometric template protection via randomized dynamic quantization transformation
    • Apr
    • A. Teoh and S. O. Thian, "Secure biometric template protection via randomized dynamic quantization transformation," in Proc. IEEE Int. Symp. Biometrics Security Technol., Apr. 2008, pp. 1-6.
    • (2008) Proc. IEEE Int. Symp. Biometrics Security Technol , pp. 1-6
    • Teoh, A.1    Thian, S.O.2
  • 40
    • 44049084315 scopus 로고    scopus 로고
    • Template-free biometric-key generation by means of fuzzy genetic clustering
    • Jun
    • W. Sheng, G. Howells, M. Fairhurst, and F. Deravi, "Template-free biometric-key generation by means of fuzzy genetic clustering," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 183-191, Jun. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.2 , pp. 183-191
    • Sheng, W.1    Howells, G.2    Fairhurst, M.3    Deravi, F.4
  • 41
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • Nov
    • G. Yang, D. S. Wong, H. Wang, and X. Deng, "Two-factor mutual authentication based on smart cards and passwords," J. Comput. Syst. Sci., vol. 74, no. 7, pp. 1160-1172, Nov. 2008.
    • (2008) J. Comput. Syst. Sci. , vol.74 , Issue.7 , pp. 1160-1172
    • Yang, G.1    Wong, D.S.2    Wang, H.3    Deng, X.4
  • 42
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Berlin, Germany: Springer-Verlag
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1993, pp. 232-249.
    • (1993) Advances in Cryptology , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 43
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Berlin, Germany: Springer-Verlag
    • R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2001, pp. 453-474.
    • (2001) Advances in Cryptology , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 44
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Berlin, Germany: Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2000, pp. 139-155.
    • (2000) Advances in Cryptology , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 45
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • J. Xu, W.-T. Zhu, and D.-G. Feng, "An improved smart card based password authentication scheme with provable security," Comput. Standards Inter., vol. 31, no. 4, pp. 723-728, 2009.
    • (2009) Comput. Standards Inter. , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.-T.2    Feng, D.-G.3
  • 46
    • 80051485094 scopus 로고    scopus 로고
    • A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card
    • J. Xu, W.-T. Zhu, and W. Jin, "A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card," Concurrency Comput., Pract. Exper., vol. 23, no. 12, pp. 1386-1398, 2011.
    • (2011) Concurrency Comput., Pract. Exper. , vol.23 , Issue.12 , pp. 1386-1398
    • Xu, J.1    Zhu, W.-T.2    Jin, W.3
  • 47
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. L. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAM J. Comput., vol. 17, no. 2, pp. 281-308, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.