A key agreement scheme for identity authentication based on multiple security factors

被引:0
|
作者
Wang Y. [1 ]
Peng X. [1 ]
Bian J. [1 ,2 ]
机构
[1] College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan, 030024, Shanxi
[2] The Center of Information and Network, Shanxi Medical College of Continuing Education, Taiyuan, 030012, Shanxi
来源
Int. J. Simul. Syst. Sci. Technol. | / 3卷 / 13.1-13.7期
关键词
Attack; Authentication; Biometric; ECC; Smart card;
D O I
10.5013/IJSSST.a.17.03.13
中图分类号
学科分类号
摘要
By the study of Li-Hwang's three-factor authenticated key agreement protocol, we find there exists multiple attack in it. Therefore, this paper proposes a remote user authentication protocol based on ECC to improve the protocol. The new protocol only needs one point multiplication of elliptic curve cryptography in login and authentication protocol, so its computation efficiency is high. The protocol can resist all the attack mentioned in this paper, smart cards loss attack included. It is also suited to three-factor authentication protocol including password, mobile devices and biometrics. The comparisons with related schemes in computation price and efficiency show that though it costs a little more computation consumption than relative protocols, it has better performance in robustness. © 2016, UK Simulation Society. All rights reserved.
引用
收藏
页码:13.1 / 13.7
相关论文
共 50 条
  • [41] Security Enhancements of Smart Card-Based Remote User Password Authentication Scheme with Session Key Agreement
    An, Young-Hwa
    2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 669 - 674
  • [42] Security of the Multiple-Key Blom's Key Agreement Scheme for Sensor Networks
    Yang, Mee Loong
    Al Anbuky, Adnan
    Liu, William
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 66 - 79
  • [43] QKBAKA: A Quantum-Key-Based Authentication and Key Agreement Scheme for Internet of Vehicles
    Shi, Qin
    Yang, Ze
    Cheng, Teng
    Wang, Chuansu
    Wu, Zexu
    Zhang, Xing
    Xu, Peiling
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12292 - 12306
  • [44] On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Hamed Arshad
    Vahid Teymoori
    Morteza Nikooghadam
    Hassan Abbassi
    Journal of Medical Systems, 2015, 39
  • [45] On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Arshad, Hamed
    Teymoori, Vahid
    Nikooghadam, Morteza
    Abbassi, Hassan
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
  • [46] Resilient Group Key Agreement Protocol with Authentication Security
    Rajaram, M.
    Thilagavathy, D.
    Devi, N. Kanjana
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGIES (ICICT), 2010,
  • [47] Security enhancement for the "simple authentication key agreement algorithm"
    Lin, IC
    Chang, CC
    Hwang, MS
    24TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COSPSAC 2000), 2000, 24 : 113 - 115
  • [48] A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
    Kolesnikov, Vladimir
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 235 - 252
  • [49] On the security of an enhanced UMTS authentication and key agreement protocol
    Hwang, Min-Shiang
    Chong, Song-Kong
    Ou, Hsia-Hung
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2011, 22 (03): : 99 - 112
  • [50] A lightweight authentication and key agreement scheme for smart grid
    Yan, Lili
    Chang, Yan
    Zhang, Shibin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (02):