메뉴 건너뛰기




Volumn 15, Issue 4, 2018, Pages 708-722

Two Birds with One Stone: Two-Factor Authentication with Security beyond Conventional Bound

Author keywords

provable security; random oracle model; smart card loss attack; Two factor authentication; Zipf's law

Indexed keywords

BIRDS; SMART CARDS;

EID: 85038117533     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2016.2605087     Document Type: Article
Times cited : (447)

References (61)
  • 1
    • 84878353718 scopus 로고    scopus 로고
    • The quest to replace passwords: A framework for comparative evaluation of Web authentication schemes
    • J. Bonneau, C. Herley, P. Oorschot, and F. Stajano, "The quest to replace passwords: A framework for comparative evaluation of Web authentication schemes, " in Proc. IEEE Symp. Secur. Privacy, 2012, pp. 553-567.
    • (2012) Proc. IEEE Symp. Secur. Privacy , pp. 553-567
    • Bonneau, J.1    Herley, C.2    Oorschot, P.3    Stajano, F.4
  • 3
    • 71449093776 scopus 로고    scopus 로고
    • Efficient and secure authenticated key exchange using weak passwords
    • J. Katz, R. Ostrovsky, and M. Yung, "Efficient and secure authenticated key exchange using weak passwords, " J. ACM, vol. 57, no. 1, pp. 1-41, 2009.
    • (2009) J. ACM , vol.57 , Issue.1 , pp. 1-41
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 5
    • 85053910515 scopus 로고    scopus 로고
    • May 2014. [Online]
    • M. Adeptus, "Hashdumps and passwords, " May 2014. [Online]. Available: http://www.adeptus-mechanicus.com/codex/hashpass/hashpass.php
    • Hashdumps and Passwords
    • Adeptus, M.1
  • 8
    • 84905364011 scopus 로고    scopus 로고
    • Password cracking HPC
    • [Online]
    • J. Gosney, "Password cracking HPC, " in Proc. Password, 2012. [Online]. Available: http://bit.ly/1y00I3O
    • (2012) Proc. Password
    • Gosney, J.1
  • 16
    • 33751057130 scopus 로고    scopus 로고
    • Cognitive authentication schemes safe against spyware
    • D. Weinshall, "Cognitive authentication schemes safe against spyware, " in Proc. IEEE Symp. Secur. Privacy, 2006, pp. 295-230.
    • (2006) Proc. IEEE Symp. Secur. Privacy , pp. 230-295
    • Weinshall, D.1
  • 17
    • 84894217609 scopus 로고    scopus 로고
    • On limitations of designing leakage-resilient password systems: Attacks, principles and usability
    • Q. Yan, J. Han, Y. Li, and R. H. Deng, "On limitations of designing leakage-resilient password systems: Attacks, principles and usability, " in Proc. Netw. Distrib. Syst. Secur. Symp., 2012, pp. 1-16.
    • (2012) Proc. Netw. Distrib. Syst. Secur. Symp. , pp. 1-16
    • Yan, Q.1    Han, J.2    Li, Y.3    Deng, R.H.4
  • 18
    • 0026153410 scopus 로고
    • Remote password authentication with smart cards
    • May
    • C. Chang and T. Wu, "Remote password authentication with smart cards, " IEE Comput. Digital Tech., vol. 138, no. 3, pp. 165-168, May 1991.
    • (1991) IEE Comput. Digital Tech. , vol.138 , Issue.3 , pp. 165-168
    • Chang, C.1    Wu, T.2
  • 19
    • 84910634929 scopus 로고    scopus 로고
    • Robust multi-factor authentication for fragile communications
    • Nov./Dec.
    • X. Huang, Y. Xiang, E. Bertino, J. Zhou, and L. Xu, "Robust multi-factor authentication for fragile communications, " IEEE Trans. Depend. Secur. Comput., vol. 11, no. 6, pp. 568-581, Nov./Dec. 2014.
    • (2014) IEEE Trans. Depend. Secur. Comput. , vol.11 , Issue.6 , pp. 568-581
    • Huang, X.1    Xiang, Y.2    Bertino, E.3    Zhou, J.4    Xu, L.5
  • 20
    • 84911059606 scopus 로고    scopus 로고
    • An efficient generic framework for three-factor authentication with provably secure instantiation
    • Dec.
    • J. Yu, G. Wang, Y. Mu, and W. Gao, "An efficient generic framework for three-factor authentication with provably secure instantiation, " IEEE Trans. Inf. Forensics Secur., vol. 9, no. 12, pp. 2302-2313, Dec. 2014.
    • (2014) IEEE Trans. Inf. Forensics Secur. , vol.9 , Issue.12 , pp. 2302-2313
    • Yu, J.1    Wang, G.2    Mu, Y.3    Gao, W.4
  • 21
    • 84975275069 scopus 로고    scopus 로고
    • Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
    • Jul./Aug.
    • D. Wang, D. He, P. Wang, and C.-H. Chu, "Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment, " IEEE Trans. Depend. Secur. Comput., vol. 12, no. 4, pp. 428-442, Jul./Aug. 2015.
    • (2015) IEEE Trans. Depend. Secur. Comput. , vol.12 , Issue.4 , pp. 428-442
    • Wang, D.1    He, D.2    Wang, P.3    Chu, C.-H.4
  • 22
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • G. M. Yang, D. S. Wong, H. X. Wang, and X. T. Deng, "Two-factor mutual authentication based on smart cards and passwords, " J. Comput. Syst. Sci., vol. 74, no. 7, pp. 1160-1172, 2008.
    • (2008) J. Comput. Syst. Sci. , vol.74 , Issue.7 , pp. 1160-1172
    • Yang, G.M.1    Wong, D.S.2    Wang, H.X.3    Deng, X.T.4
  • 23
    • 84903203451 scopus 로고    scopus 로고
    • Further observations on smart-card-based password-authenticated key agreement in distributed systems
    • Jul.
    • X. Huang, X. Chen, J. Li, Y. Xiang, and L. Xu, "Further observations on smart-card-based password-authenticated key agreement in distributed systems, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1767-1775, Jul. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.7 , pp. 1767-1775
    • Huang, X.1    Chen, X.2    Li, J.3    Xiang, Y.4    Xu, L.5
  • 24
    • 84863921959 scopus 로고    scopus 로고
    • Password protected smart card and memory stick authentication against off-line dictionary attacks
    • Y. G. Wang, "Password protected smart card and memory stick authentication against off-line dictionary attacks, " in Proc. 27th IFIP TC 11 Inf. Secur. Privacy Conf. Inf. Secur. Privacy Res., 2012, pp. 489-500.
    • (2012) Proc. 27th IFIP TC 11 Inf. Secur. Privacy Conf. Inf. Secur. Privacy Res. , pp. 489-500
    • Wang, Y.G.1
  • 25
    • 84860376061 scopus 로고    scopus 로고
    • Dynamic ID-based remote user password authentication schemes using smart cards: A review
    • R. Madhusudhan and R. Mittal, "Dynamic ID-based remote user password authentication schemes using smart cards: A review, " J. Netw. Comput. Appl., vol. 35, no. 4, pp. 1235-1248, 2012.
    • (2012) J. Netw. Comput. Appl. , vol.35 , Issue.4 , pp. 1235-1248
    • Madhusudhan, R.1    Mittal, R.2
  • 26
    • 84863056589 scopus 로고    scopus 로고
    • Robust smart-cards-based user authentication scheme with user anonymity
    • S. H. Wu, Y. F. Zhu, and Q. Pu, "Robust smart-cards-based user authentication scheme with user anonymity, " Secur. Commun. Netw., vol. 5, no. 2, pp. 236-248, 2012.
    • (2012) Secur. Commun. Netw. , vol.5 , Issue.2 , pp. 236-248
    • Wu, S.H.1    Zhu, Y.F.2    Pu, Q.3
  • 27
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • C. Fan, Y. Chan, and Z. Zhang, "Robust remote authentication scheme with smart cards, " Comput. Secur., vol. 24, no. 8, pp. 619-628, 2005.
    • (2005) Comput. Secur. , vol.24 , Issue.8 , pp. 619-628
    • Fan, C.1    Chan, Y.2    Zhang, Z.3
  • 28
    • 84886653936 scopus 로고    scopus 로고
    • Novel anonymous authentication scheme using smart cards
    • Nov.
    • J.-L. Tsai, N.-W. Lo, and T.-C. Wu, "Novel anonymous authentication scheme using smart cards, " IEEE Trans. Ind. Informat., vol. 9, no. 4, pp. 2004-2013, Nov. 2013.
    • (2013) IEEE Trans. Ind. Informat. , vol.9 , Issue.4 , pp. 2004-2013
    • Tsai, J.-L.1    Lo, N.-W.2    Wu, T.-C.3
  • 29
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • J. Xu, W. Zhu, and D. Feng, "An improved smart card based password authentication scheme with provable security, " Comput. Standards Interfaces, vol. 31, no. 4, pp. 723-728, 2009.
    • (2009) Comput. Standards Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.2    Feng, D.3
  • 31
    • 84945490174 scopus 로고    scopus 로고
    • Privacy preserving smartcard-based authentication system with provable security
    • J. W. Byun, "Privacy preserving smartcard-based authentication system with provable security, " Secur. Commun. Netw., vol. 8, no. 17, pp. 3028-3044, 2015.
    • (2015) Secur. Commun. Netw. , vol.8 , Issue.17 , pp. 3028-3044
    • Byun, J.W.1
  • 32
    • 84938203681 scopus 로고    scopus 로고
    • Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
    • D. Wang, N. Wang, P. Wang, and S. Qing, "Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity, " Inf. Sci., vol. 321, pp. 162-178, 2015.
    • (2015) Inf. Sci. , vol.321 , pp. 162-178
    • Wang, D.1    Wang, N.2    Wang, P.3    Qing, S.4
  • 33
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: Analyzing an anonymized corpus of 70 million passwords
    • J. Bonneau, "The science of guessing: Analyzing an anonymized corpus of 70 million passwords, " in Proc. IEEE Symp. Secur. Privacy, 2012, pp. 538-552.
    • (2012) Proc. IEEE Symp. Secur. Privacy , pp. 538-552
    • Bonneau, J.1
  • 36
    • 71849087704 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • S. Halevi and H. Krawczyk, "Public-key cryptography and password protocols, " ACM Trans. Inf. Syst. Secur., vol. 2, pp. 230-268, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , pp. 230-268
    • Halevi, S.1    Krawczyk, H.2
  • 37
    • 84951285097 scopus 로고    scopus 로고
    • Small tweaks do not help: Differential power analysis of milenage implementations in 3G/4G USIM cards
    • J. Liu, Y. Yu, and F.-X. Standaert, "Small tweaks do not help: Differential power analysis of milenage implementations in 3G/4G USIM cards, " in Proc. 20th Eur. Symp. Res. Comput. Secur., 2015, pp. 468-480.
    • (2015) Proc. 20th Eur. Symp. Res. Comput. Secur. , pp. 468-480
    • Liu, J.1    Yu, Y.2    Standaert, F.-X.3
  • 40
    • 84892516382 scopus 로고    scopus 로고
    • Robust smart-card-based remote user password authentication scheme
    • B. Chen and W. Kuo, "Robust smart-card-based remote user password authentication scheme, " Int. J. Commun. Syst., vol. 27, no. 2, pp. 377-389, 2014.
    • (2014) Int. J. Commun. Syst. , vol.27 , Issue.2 , pp. 377-389
    • Chen, B.1    Kuo, W.2
  • 41
    • 84914669082 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme
    • S. Kumari and M. K. Khan, "Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme, " Int. J. Commun. Syst., vol. 27, no. 12, pp. 3939-3955, 2014.
    • (2014) Int. J. Commun. Syst. , vol.27 , Issue.12 , pp. 3939-3955
    • Kumari, S.1    Khan, M.K.2
  • 43
    • 67649386419 scopus 로고    scopus 로고
    • Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards
    • Jun.
    • D. Sun, J. Huai, J. Sun, J. Li, and Z. Feng, "Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards, " IEEE Trans. Ind. Electron., vol. 56, no. 6, pp. 2284-2291, Jun. 2009.
    • (2009) IEEE Trans. Ind. Electron. , vol.56 , Issue.6 , pp. 2284-2291
    • Sun, D.1    Huai, J.2    Sun, J.3    Li, J.4    Feng, Z.5
  • 44
    • 84864344507 scopus 로고    scopus 로고
    • Secure password-based remote user authentication scheme with non-tamper resistant smart cards
    • D. Wang, C. G. Ma, and P. Wu, "Secure password-based remote user authentication scheme with non-tamper resistant smart cards, " in Proc. 26th Annu. IFIP WG 11.3 Conf. Data Appl. Secur. Privacy, 2012, pp. 114-121.
    • (2012) Proc. 26th Annu. IFIP WG 11.3 Conf. Data Appl. Secur. Privacy , pp. 114-121
    • Wang, D.1    Ma, C.G.2    Wu, P.3
  • 45
    • 80053379375 scopus 로고    scopus 로고
    • A robust remote user authentication scheme using smart card
    • C. T. Li and C. Lee, "A robust remote user authentication scheme using smart card, " Inf. Tech. Control, vol. 40, no. 3, pp. 236-245, 2011.
    • (2011) Inf. Tech. Control , vol.40 , Issue.3 , pp. 236-245
    • Li, C.T.1    Lee, C.2
  • 46
    • 84906774949 scopus 로고    scopus 로고
    • On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
    • D. Wang and P. Wang, "On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions, " Comput. Netw., vol. 73, pp. 41-57, 2014.
    • (2014) Comput. Netw. , vol.73 , pp. 41-57
    • Wang, D.1    Wang, P.2
  • 47
    • 84979688615 scopus 로고    scopus 로고
    • The request for better measurement: A comparative evaluation of two-factor authentication schemes
    • D. Wang, Q. Gu, H. Cheng, and P. Wang, "The request for better measurement: A comparative evaluation of two-factor authentication schemes, " in Proc. 11th ACM Asia Conf. Comput. Commun. Secur., 2016, pp. 475-486.
    • (2016) Proc. 11th ACM Asia Conf. Comput. Commun. Secur. , pp. 475-486
    • Wang, D.1    Gu, Q.2    Cheng, H.3    Wang, P.4
  • 49
    • 33748126252 scopus 로고    scopus 로고
    • A password authentication scheme over insecure networks
    • I. Liao, C. Lee, and M. Hwang, "A password authentication scheme over insecure networks, " J. Comput. Syst. Sci., vol. 72, no. 4, pp. 727-740, 2006.
    • (2006) J. Comput. Syst. Sci. , vol.72 , Issue.4 , pp. 727-740
    • Liao, I.1    Lee, C.2    Hwang, M.3
  • 51
    • 84883653668 scopus 로고    scopus 로고
    • An enhanced smart card based remote user password authentication scheme
    • X. Li, J. Niu, M. K. Khan, and J. Liao, "An enhanced smart card based remote user password authentication scheme, " J. Netw. Comput. Appl., vol. 36, no. 5, pp. 1365-1371, 2013.
    • (2013) J. Netw. Comput. Appl. , vol.36 , Issue.5 , pp. 1365-1371
    • Li, X.1    Niu, J.2    Khan, M.K.3    Liao, J.4
  • 52
    • 84884990326 scopus 로고    scopus 로고
    • A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
    • K. Xue, P. Hong, and C. Ma, "A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture, " J. Comput. Syst. Sci., vol. 80, no. 1, pp. 195-206, 2014.
    • (2014) J. Comput. Syst. Sci. , vol.80 , Issue.1 , pp. 195-206
    • Xue, K.1    Hong, P.2    Ma, C.3
  • 55
    • 80051962268 scopus 로고    scopus 로고
    • Using fingerprint authentication to reduce security: An empirical study
    • H. Wimberly and L. Liebrock, "Using fingerprint authentication to reduce security: An empirical study, " in Proc. IEEE Symp. Secur. Privacy, 2011, pp. 32-46.
    • (2011) Proc. IEEE Symp. Secur. Privacy , pp. 32-46
    • Wimberly, H.1    Liebrock, L.2
  • 56
    • 84937853874 scopus 로고    scopus 로고
    • A secure biometrics-based multi-server authentication protocol using smart cards
    • Sep.
    • V. Odelu, A. Das, and A. Goswami, "A secure biometrics-based multi-server authentication protocol using smart cards, " IEEE Trans. Inf. Forensics Secur., vol. 10, no. 9, pp. 1953-1966, Sep. 2015.
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.10 , Issue.9 , pp. 1953-1966
    • Odelu, V.1    Das, A.2    Goswami, A.3
  • 57
    • 84988227377 scopus 로고    scopus 로고
    • Improvement of robust smart-card-based password authentication scheme
    • Q. Jiang, J. Ma, G. Li, and X. Li, "Improvement of robust smart-card-based password authentication scheme, " Int. J. Commun. Syst., vol. 28, no. 2, pp. 383-393, 2015.
    • (2015) Int. J. Commun. Syst. , vol.28 , Issue.2 , pp. 383-393
    • Jiang, Q.1    Ma, J.2    Li, G.3    Li, X.4
  • 58
    • 84942693700 scopus 로고    scopus 로고
    • Chaotic Chebyshev polynomials based remote user authentication scheme in client-server environment
    • T.-T. Truong, M.-T. Tran, A.-D. Duong, and I. Echizen, "Chaotic Chebyshev polynomials based remote user authentication scheme in client-server environment, " in Proc. 30th IFIP Int. Inf. Secur. Conf., 2015, pp. 479-494.
    • (2015) Proc. 30th IFIP Int. Inf. Secur. Conf. , pp. 479-494
    • Truong, T.-T.1    Tran, M.-T.2    Duong, A.-D.3    Echizen, I.4
  • 59
    • 84899037889 scopus 로고    scopus 로고
    • Design and analysis of an improved smartcard-based remote user password authentication scheme
    • S. Islam, "Design and analysis of an improved smartcard-based remote user password authentication scheme, " Int. J. Commun. Syst., vol. 29, no. 11, pp. 1708-1719, 2016.
    • (2016) Int. J. Commun. Syst. , vol.29 , Issue.11 , pp. 1708-1719
    • Islam, S.1
  • 61
    • 33745201299 scopus 로고    scopus 로고
    • Shamus Softw. Ltd. [Online]
    • M. Scott, "Miracl library, " Shamus Softw. Ltd. [Online]. Available: http://www.shamus.ie/index.php?page=home
    • Miracl Library
    • Scott, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.