메뉴 건너뛰기




Volumn 10, Issue 9, 2015, Pages 1953-1966

A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards

Author keywords

Authentication; AVISPA; BAN logic; Revocation and re registration; Security; Smart card

Indexed keywords

BIOMETRICS; COMPUTATION THEORY; CRYPTOGRAPHY; INTERNET PROTOCOLS; MOBILE DEVICES; NETWORK PROTOCOLS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; SMART CARDS; TRANSPORTATION;

EID: 84937853874     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2015.2439964     Document Type: Article
Times cited : (397)

References (52)
  • 1
    • 84886653936 scopus 로고    scopus 로고
    • Novel anonymous authentication scheme using smart cards
    • Nov
    • J.-L. Tsai, N.-W. Lo, and T.-C. Wu"Novel anonymous authentication scheme using smart cards"IEEE Trans. Ind. Informat., vol. 9, no. 4, pp. 2004-2013, Nov. 2013
    • (2013) IEEE Trans. Ind. Informat , vol.9 , Issue.4 , pp. 2004-2013
    • Tsai, J.-L.1    Lo, N.-W.2    Wu, T.-C.3
  • 2
    • 84894646273 scopus 로고    scopus 로고
    • Cloudbased augmentation for mobile devices: Motivation, taxonomies, and open challenges
    • First Quarter
    • S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya"Cloudbased augmentation for mobile devices: Motivation, taxonomies, and open challenges"IEEE Commun. Surv. Tuts., vol. 16, no. 1, pp. 337-368, First Quarter 2014
    • (2014) IEEE Commun. Surv. Tuts , vol.16 , Issue.1 , pp. 337-368
    • Abolfazli, S.1    Sanaei, Z.2    Ahmed, E.3    Gani, A.4    Buyya, R.5
  • 3
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Austria: Springer-Verlag
    • R. Canetti and H. Krawczyk"Analysis of key-exchange protocols and their use for building secure channels"in Advances in Cryptology. Innsbruck, Austria: Springer-Verlag, 2001, pp. 453-474
    • (2001) Advances in Cryptology. Innsbruck , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 4
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • M. Bellare, R. Canetti, and H. Krawczyk"A modular approach to the design and analysis of authentication and key exchange protocols"in Proc. 30th Annu. ACM Symp. Theory Comput. (STOC), 1998, pp. 419-428
    • (1998) Proc. 30th Annu ACM Symp. Theory Comput. (STOC , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 5
    • 84863345554 scopus 로고    scopus 로고
    • Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities
    • May/Jun
    • E. Brickell and J. Li"Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities"IEEE Trans. Dependable Secure Comput., vol. 9, no. 3, pp. 345-360, May/Jun. 2012
    • (2012) IEEE Trans. Dependable Secure Comput , vol.9 , Issue.3 , pp. 345-360
    • Brickell, E.1    Li, J.2
  • 6
    • 84903203451 scopus 로고    scopus 로고
    • Further observations on smart-card-based password-Authenticated key agreement in distributed systems
    • Jul
    • X. Huang, X. Chen, J. Li, Y. Xiang, and L. Xu"Further observations on smart-card-based password-Authenticated key agreement in distributed systems"IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1767-1775, Jul. 2014
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , Issue.7 , pp. 1767-1775
    • Huang, X.1    Chen, X.2    Li, J.3    Xiang, Y.4    Xu, L.5
  • 7
    • 84938203187 scopus 로고    scopus 로고
    • Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
    • to be published
    • D. Wang, D. He, P. Wang, and C. Chu"Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment"IEEE Trans. Dependable Secure Comput., to be published
    • IEEE Trans. Dependable Secure Comput
    • Wang, D.1    He, D.2    Wang, P.3    Chu, C.4
  • 8
    • 84863056589 scopus 로고    scopus 로고
    • Robust smart-cards-based user authentication scheme with user anonymity
    • S. Wu, Y. Zhu, and Q. Pu"Robust smart-cards-based user authentication scheme with user anonymity"Secur. Commun. Netw., vol. 5, no. 2, pp. 236-248, 2012
    • (2012) Secur. Commun. Netw , vol.5 , Issue.2 , pp. 236-248
    • Wu, S.1    Zhu, Y.2    Pu, Q.3
  • 9
    • 84914669082 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme
    • S. Kumari and M. K. Khan"Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme, Int. J. Commun. Syst., vol. 27, no. 12, pp. 3939-3955, 2014
    • (2014) Int. J. Commun. Syst , vol.27 , Issue.12 , pp. 3939-3955
    • Kumari, S.1    Khan, M.K.2
  • 10
    • 84893037497 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of 'an efficient and secure dynamic ID-based authentication scheme for telecare medical information systems
    • M. K. Khan and S. Kumari"Cryptanalysis and improvement of 'an efficient and secure dynamic ID-based authentication scheme for telecare medical information systems, Secur. Commun. Netw., vol. 7, no. 2, pp. 399-408, 2014
    • (2014) Secur. Commun. Netw , vol.7 , Issue.2 , pp. 399-408
    • Khan, M.K.1    Kumari, S.2
  • 11
    • 79951676054 scopus 로고    scopus 로고
    • Privacy-preserving universal authentication protocol for wireless communications
    • Feb
    • D. He, J. Bu, S. Chan, C. Chen, and M. Yin"Privacy-preserving universal authentication protocol for wireless communications"IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 431-436, Feb. 2011
    • (2011) IEEE Trans. Wireless Commun , vol.10 , Issue.2 , pp. 431-436
    • He, D.1    Bu, J.2    Chan, S.3    Chen, C.4    Yin, M.5
  • 12
    • 55749113850 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement protocol for SIP using ECC
    • L. Wu, Y. Zhang, and F. Wang"A new provably secure authentication and key agreement protocol for SIP using ECC"Comput. Standards Interf., vol. 31, no. 2, pp. 286-291, 2009
    • (2009) Comput. Standards Interf , vol.31 , Issue.2 , pp. 286-291
    • Wu, L.1    Zhang, Y.2    Wang, F.3
  • 13
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport"Password authentication with insecure communication"Commun. ACM, vol. 24, no. 11, pp. 770-772, 1981
    • (1981) Commun ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 14
    • 0035506864 scopus 로고    scopus 로고
    • A remote password authentication scheme for multiserver architecture using neural networks
    • Nov
    • L.-H. Li, I.-C. Lin, and M.-S. Hwang"A remote password authentication scheme for multiserver architecture using neural networks"IEEE Trans. Neural Netw., vol. 12, no. 6, pp. 1498-1504, Nov. 2001
    • (2001) IEEE Trans. Neural Netw , vol.12 , Issue.6 , pp. 1498-1504
    • Li, L.-H.1    Lin, I.-C.2    Hwang, M.-S.3
  • 15
    • 84904545458 scopus 로고    scopus 로고
    • Weaknesses of the Yoon-Kim-Yoo remote user authentication scheme using smart cards
    • Ottawa, ON, Canada, May
    • T.-Y. Chen, C.-H. Ling, and M.-S. Hwang"Weaknesses of the Yoon-Kim-Yoo remote user authentication scheme using smart cards"in Proc. IEEE Workshop Electron., Comput. Appl., Ottawa, ON, Canada, May 2014, pp. 771-774
    • (2014) Proc IEEE Workshop Electron., Comput. Appl , pp. 771-774
    • Chen, T.-Y.1    Ling, C.-H.2    Hwang, M.-S.3
  • 16
    • 1942455353 scopus 로고    scopus 로고
    • Efficient multi-server password authenticated key agreement using smart cards
    • Feb
    • W.-S. Juang"Efficient multi-server password authenticated key agreement using smart cards"IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 251-255, Feb. 2004
    • (2004) IEEE Trans. Consum. Electron , vol.50 , Issue.1 , pp. 251-255
    • Juang, W.-S.1
  • 17
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    • H.-C. Hsiang and W.-K. Shih"Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment"Comput. Standards Interf., vol. 31, no. 6, pp. 1118-1123, 2009
    • (2009) Comput. Standards Interf , vol.31 , Issue.6 , pp. 1118-1123
    • Hsiang, H.-C.1    Shih, W.-K.2
  • 18
    • 84888003168 scopus 로고    scopus 로고
    • Towards secure and efficient user authentication scheme using smart card for multiserver environments
    • T.-Y. Chen, C.-C. Lee, M.-S. Hwang, and J.-K. Jan"Towards secure and efficient user authentication scheme using smart card for multiserver environments"J. Supercomput., vol. 66, no. 2, pp. 1008-1032, 2013
    • (2013) J. Supercomput , vol.66 , Issue.2 , pp. 1008-1032
    • Chen, T.-Y.1    Lee, C.-C.2    Hwang, M.-S.3    Jan, J.-K.4
  • 19
    • 84880841622 scopus 로고    scopus 로고
    • A new password-based multi-server authentication scheme robust to password guessing attacks
    • J.-L. Tsai, N.-W. Lo, and T.-C. Wu"A new password-based multi-server authentication scheme robust to password guessing attacks"Wireless Pers. Commun., vol. 71, no. 3, pp. 1977-1988, 2013
    • (2013) Wireless Pers. Commun , vol.71 , Issue.3 , pp. 1977-1988
    • Tsai, J.-L.1    Lo, N.-W.2    Wu, T.-C.3
  • 20
    • 84872320813 scopus 로고    scopus 로고
    • Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
    • E.-J. Yoon and K.-Y. Yoo"Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem"J. Supercomput., vol. 63, no. 1, pp. 235-255, 2013
    • (2013) J. Supercomput , vol.63 , Issue.1 , pp. 235-255
    • Yoon, E.-J.1    Yoo, K.-Y.2
  • 21
    • 84863921912 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
    • Salvador, Brazil
    • H. Kim, W. Jeon, K. Lee, Y. Lee, and D. Won"Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme"in Proc. 12th Int. Conf. Comput. Sci. Appl. (ICCSA), Salvador, Brazil, 2012, pp. 391-406
    • (2012) Proc. 12th Int. Conf. Comput. Sci. Appl. (ICCSA) , pp. 391-406
    • Kim, H.1    Jeon, W.2    Lee, K.3    Lee, Y.4    Won, D.5
  • 22
    • 84902111117 scopus 로고    scopus 로고
    • Security flaws in a biometrics-based multi-server authentication with key agreement scheme
    • Tech. Rep. 2011/365
    • D. He. (2011)."Security flaws in a biometrics-based multi-server authentication with key agreement scheme"IACR Cryptol. ePrint Arch., Tech. Rep. 2011/365, pp. 1-9
    • (2011) IACR Cryptol. EPrint Arch , pp. 1-9
    • He, D.1
  • 23
    • 84937871044 scopus 로고    scopus 로고
    • [Online]. Available: http://eprint.iacr.org/2011/365.pdf
  • 24
    • 84937926060 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multiserver environment
    • to be published
    • D. He and D. Wang"Robust biometrics-based authentication scheme for multiserver environment"IEEE Syst. J., to be published
    • IEEE Syst. J.
    • He, D.1    Wang, D.2
  • 25
    • 0002326595 scopus 로고    scopus 로고
    • Biometric identification
    • A. Jain, L. Hong, and S. Pankanti"Biometric identification"Commun. ACM, vol. 43, no. 2, pp. 90-98, 2000
    • (2000) Commun ACM , vol.43 , Issue.2 , pp. 90-98
    • Jain, A.1    Hong, L.2    Pankanti, S.3
  • 26
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. K. Ratha, J. H. Connell, and R. M. Bolle"Enhancing security and privacy in biometrics-based authentication systems"IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001
    • (2001) IBM Syst. J , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 27
    • 1842715081 scopus 로고    scopus 로고
    • The advantages of elliptic curve cryptography for wireless security
    • Feb
    • K. Lauter"The advantages of elliptic curve cryptography for wireless security"IEEE Wireless Commun., vol. 11, no. 1, pp. 62-67, Feb. 2004
    • (2004) IEEE Wireless Commun , vol.11 , Issue.1 , pp. 62-67
    • Lauter, K.1
  • 29
    • 0036566408 scopus 로고    scopus 로고
    • Examining smartcard security under the threat of power analysis attacks
    • May
    • T. S. Messerges, E. A. Dabbish, and R. H. Sloan"Examining smartcard security under the threat of power analysis attacks"IEEE Trans. Comput., vol. 51, no. 5, pp. 541-552, May 2002
    • (2002) IEEE Trans. Comput , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 30
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Mar
    • D. Dolev and A. C. Yao"On the security of public key protocols"IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 32
    • 78651389846 scopus 로고    scopus 로고
    • A simple and generic construction of authenticated encryption with associated data
    • Dec, Art. ID 33
    • P. Sarkar"A simple and generic construction of authenticated encryption with associated data"ACM Trans. Inf. Syst. Secur., vol. 13, no. 4, Dec. 2010, Art. ID 33
    • (2010) ACM Trans. Inf. Syst. Secur , vol.13 , Issue.4
    • Sarkar, P.1
  • 33
    • 30744432873 scopus 로고    scopus 로고
    • Some observations on the theory of cryptographic hash functions
    • D. R. Stinson"Some observations on the theory of cryptographic hash functions"Designs, Codes Cryptogr., vol. 38, no. 2, pp. 259-277, 2006
    • (2006) Designs, Codes Cryptogr , vol.38 , Issue.2 , pp. 259-277
    • Stinson, D.R.1
  • 35
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Switzerland: Springer-Verlag
    • Y. Dodis, L. Reyzin, and A. Smith"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data"in Advances in Cryptology. Interlaken, Switzerland: Springer-Verlag, 2004, pp. 523-540
    • (2004) Advances in Cryptology. Interlaken , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 36
    • 81855227196 scopus 로고    scopus 로고
    • Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
    • A. K. Das"Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards"IET Inf. Secur., vol. 5, no. 3, pp. 145-151, 2011
    • (2011) IET Inf. Secur , vol.5 , Issue.3 , pp. 145-151
    • Das, A.K.1
  • 37
    • 84858401168 scopus 로고    scopus 로고
    • A framework for analyzing template security and privacy in biometric authentication systems
    • Apr
    • K. Simoens, J. Bringer, H. Chabanne, and S. Seys"A framework for analyzing template security and privacy in biometric authentication systems"IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 833-841, Apr. 2012
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 833-841
    • Simoens, K.1    Bringer, J.2    Chabanne, H.3    Seys, S.4
  • 38
    • 84907510051 scopus 로고    scopus 로고
    • A novel serial multimodal biometrics framework based on semisupervised learning techniques
    • Oct
    • Q. Zhang, Y. Yin, D.-C. Zhan, and J. Peng"A novel serial multimodal biometrics framework based on semisupervised learning techniques"IEEE Trans. Inf. Forensics Security, vol. 9, no. 10, pp. 1681-1694, Oct. 2014
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.10 , pp. 1681-1694
    • Zhang, Q.1    Yin, Y.2    Zhan, D.-C.3    Peng, J.4
  • 39
    • 78649427215 scopus 로고    scopus 로고
    • Soft biometric traits for continuous user authentication
    • Dec
    • K. Niinuma, U. Park, and A. K. Jain"Soft biometric traits for continuous user authentication"IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 771-780, Dec. 2010
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 771-780
    • Niinuma, K.1    Park, U.2    Jain, A.K.3
  • 40
    • 85032751447 scopus 로고    scopus 로고
    • Privacy-preserving speech processing: Cryptographic and string-matching frameworks show promise
    • Mar
    • M. A. Pathak, B. Raj, S. D. Rane, and P. Smaragdis"Privacy-preserving speech processing: Cryptographic and string-matching frameworks show promise"IEEE Signal Process. Mag., vol. 30, no. 2, pp. 62-74, Mar. 2013
    • (2013) IEEE Signal Process. Mag , vol.30 , Issue.2 , pp. 62-74
    • Pathak, M.A.1    Raj, B.2    Rane, S.D.3    Smaragdis, P.4
  • 43
    • 61449086383 scopus 로고    scopus 로고
    • User authentication scheme with privacy-preservation for multi-server environment
    • Feb
    • R.-C. Wang, W.-S. Juang, and C.-L. Lei"User authentication scheme with privacy-preservation for multi-server environment"IEEE Commun. Lett., vol. 13, no. 2, pp. 157-159, Feb. 2009
    • (2009) IEEE Commun. Lett , vol.13 , Issue.2 , pp. 157-159
    • Wang, R.-C.1    Juang, W.-S.2    Lei, C.-L.3
  • 44
    • 78649335192 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
    • X. Li, J.-W. Niu, J. Ma, W.-D. Wang, and C.-L. Liu"Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards"J. Netw. Comput. Appl., vol. 34, no. 1, pp. 73-79, 2011
    • (2011) J. Netw. Comput. Appl , vol.34 , Issue.1 , pp. 73-79
    • Li, X.1    Niu, J.-W.2    Ma, J.3    Wang, W.-D.4    Liu, C.-L.5
  • 45
    • 79959689122 scopus 로고    scopus 로고
    • A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
    • Aug
    • X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. H. Deng"A generic framework for three-factor authentication: Preserving security and privacy in distributed systems"IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 8, pp. 1390-1397, Aug. 2011
    • (2011) IEEE Trans. Parallel Distrib. Syst , vol.22 , Issue.8 , pp. 1390-1397
    • Huang, X.1    Xiang, Y.2    Chonka, A.3    Zhou, J.4    Deng, R.H.5
  • 47
    • 84937834943 scopus 로고    scopus 로고
    • AVISPA: Automated Validation of Internet Security Protocols and Applications [accessed Jan 2013
    • AVISPA: Automated Validation of Internet Security Protocols and Applications [Online]. Available: http://www.avispa-project.org/, accessed Jan. 2013
  • 48
    • 84870657665 scopus 로고    scopus 로고
    • An novel three-party authenticated key exchange protocol using one-time key
    • C. Lv, M. Ma, H. Li, J. Ma, and Y. Zhang"An novel three-party authenticated key exchange protocol using one-time key"J. Netw. Comput. Appl., vol. 36, no. 1, pp. 498-503, 2013
    • (2013) J. Netw. Comput. Appl , vol.36 , Issue.1 , pp. 498-503
    • Lv, C.1    Ma, M.2    Li, H.3    Ma, J.4    Zhang, Y.5
  • 49
    • 19744367735 scopus 로고    scopus 로고
    • OFMC: A symbolic model checker for security protocols
    • D. Basin, S. Mödersheim, and L. Vigano"OFMC: A symbolic model checker for security protocols"Int. J. Inf. Secur., vol. 4, no. 3, pp. 181-208, 2005
    • (2005) Int. J. Inf. Secur , vol.4 , Issue.3 , pp. 181-208
    • Basin, D.1    Mödersheim, S.2    Vigano, L.3
  • 50
    • 84937907026 scopus 로고
    • FIPS PUB 180-1, Secure Hash Standard, U.S. Dept. Commerce, Nat. Inst. Standards Technol., Washington, DC, USA Apr
    • FIPS PUB 180-1, Secure Hash Standard, U.S. Dept. Commerce, Nat. Inst. Standards Technol., Washington, DC, USA, Apr. 1995
    • (1995)
  • 51
    • 84937911079 scopus 로고    scopus 로고
    • National Institute of Standards and Technology NIST U.S. Department of Commerce. (Nov FIPS PUB 197, Advanced Encryption Standard, accessed Nov 2010
    • National Institute of Standards and Technology (NIST), U.S. Department of Commerce. (Nov. 2001). FIPS PUB 197, Advanced Encryption Standard [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, accessed Nov. 2010
    • (2001)
  • 52
    • 84901189762 scopus 로고    scopus 로고
    • A survey of SIP authentication and key agreement schemes
    • Second Quarter
    • H. H. Kilinc and T. Yanik"A survey of SIP authentication and key agreement schemes"IEEE Commun. Surv. Tuts., vol. 16, no. 2, pp. 1005-1023, Second Quarter 2014
    • (2014) IEEE Commun. Surv. Tuts , vol.16 , Issue.2 , pp. 1005-1023
    • Kilinc, H.H.1    Yanik, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.