《山东大学学报(理学版)》 ›› 2019, Vol. 54 ›› Issue (5): 44-51.doi: 10.6040/j.issn.1671-9352.2.2018.207
Juan QU1(),Yu-ming FENG2,Yan-ping LI3,Li LI1
摘要:
现有多服务器环境下的身份认证方案大多存在无法抵御各种安全攻击,不能实现匿名性等问题,基于扩展的混沌映射和生物特征方法提出了一种多服务器环境下的身份认证协议,实现用户与多服务器之间的身份认证,并在认证过程中协商了会话密钥。利用BAN逻辑对提出的协议进行了安全证明。安全性分析结果表明,本文的协议可抵御假冒攻击、离线口令猜测攻击、偷取智能卡攻击等,并具有强匿名性。最后,与现有的相关协议比较,本文的协议更安全高效,适合在实际中应用。
中图分类号:
1 |
LAMPORT L . Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24 (11): 770- 772.
doi: 10.1145/358790.358797 |
2 | FAN C I , CHAN Y C , ZHANG Z K . Robust remote authentication scheme with smart cards[J]. Computers & Security, 2005, 24 (8): 619- 628. |
3 | DAS A K . A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems[J]. Journal of Medicine System, 2015, 39 (3): 1- 20. |
4 | HE D B , ZEADALLY S , KUMAR N , et al. Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures[J]. IEEE Transactions on Information Forensics & Security, 2016, 11 (9): 2052- 2064. |
5 |
JIANG Q , CHEN Z R , LI B Y , et al. Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems[J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 (4): 1061- 1073.
doi: 10.1007/s12652-017-0516-2 |
6 |
LI X , XIONG Y P , MA J , et al. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards[J]. Journal of Network and Computer Applications, 2012, 35 (2): 763- 769.
doi: 10.1016/j.jnca.2011.11.009 |
7 | 李艳平, 刘小雪, 屈娟, 等. 基于智能卡的多服务器远程匿名认证密钥协商协议[J]. 四川大学学报(工程科学版), 2016, 48 (1): 91- 98. |
LI Yanping , LIU Xiaoxue , QU Juan , et al. Multi-server anonymous remote authenticated key agreement protocol based on smart card[J]. Journal of Sichuan University(Engineering Science Edition), 2016, 48 (1): 91- 98. | |
8 |
XUE K P , HONG P L , MA C S . A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture[J]. Journal of Computer and System Sciences, 2014, 80 (1): 195- 206.
doi: 10.1016/j.jcss.2013.07.004 |
9 |
GUPTA P C , DHAR J . Hash based multi-server key exchange protocol using smart card[J]. Wireless Personal Communications, 2016, 87 (1): 225- 244.
doi: 10.1007/s11277-015-3040-8 |
10 |
LU Y R , LI L X , PENG H P , et al. A biometrics and smart cards-based authentication scheme for multi-server environments[J]. Security and Communication Networks, 2015, 8 (17): 3219- 3228.
doi: 10.1002/sec.v8.17 |
11 |
CHANDRAKAR P , OM H . A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC[J]. Computer Communications, 2017, 110: 26- 34.
doi: 10.1016/j.comcom.2017.05.009 |
12 | GUO H , WANG P , ZHANG X Y , et al. A robust anonymous biometirc-based authenticated key agreement scheme for multi-server environments[J]. PLoS one, 2017, 12 (11): 1- 19. |
13 | YANG L , Zhang Z M . Cryptanalysis and improvement of a biometric-based authentication and key agreement scheme for multi-server environments[J]. PLoS one, 2017, 13 (3): 1- 27. |
14 |
LU Y R , LI L X , PENG H P , et al. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem[J]. Journal of Medical Systems, 2015, 39 (3): 32.
doi: 10.1007/s10916-015-0221-7 |
15 |
YEH K H . A provably secure multi-server based authentication scheme[J]. Wireless Personal Communications, 2014, 79 (3): 1621- 1634.
doi: 10.1007/s11277-014-1948-z |
16 |
PIPPAL R S , JAIDHAR C D , TAPASWI S . Robust smart card authentication scheme for multi-server architecture[J]. Wireless Personal Communications, 2013, 72 (1): 729- 745.
doi: 10.1007/s11277-013-1039-6 |
17 |
MISHRA D . Design and analysis of a provably secure multi-server authentication scheme[J]. Wireless Personal Communications, 2016, 86 (3): 1095- 1119.
doi: 10.1007/s11277-015-2975-0 |
18 | 汪定, 李文婷, 王平, 等. 对三个多服务器环境下匿名认证协议的分析[J]. 软件学报, 2018, 29 (7): 1937- 1952. |
WANG Ding , LI Wenting , WANG Ping , et al. Crytanalysis of three anonymous authentication schemes for multi-server environment[J]. Journal of Software, 2018, 29 (7): 1937- 1952. | |
19 |
REDDY A G , YOON E J , DAS A K , et al. Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment[J]. IEEE Access, 2017, 5: 3622- 3639.
doi: 10.1109/ACCESS.2017.2666258 |
20 |
万涛, 刘遵雄, 马建峰, 等. 多服务器架构下认证与密钥协商协议[J]. 计算机研究与发展, 2016, 53 (11): 2446- 2453.
doi: 10.7544/issn1000-1239.2016.20150107 |
WAN Tao , LIU Zunxiong , MA Jianfeng , et al. Authentication and key agreement protocol for multi-server architecture[J]. Journal of Computer Research and Development, 2016, 53 (11): 2446- 2453.
doi: 10.7544/issn1000-1239.2016.20150107 |
|
21 | AMIN R . Cryptanalysis and efficient dynamic ID based remote user authentication scheme in multi-server environment using smart card[J]. International Journal of Network Security, 2016, 18 (1): 172- 181. |
22 |
DODIS Y , OSTROVSKY R , REYZIN L , et al. Fuzzy extractors:how to generate strong keys from biometrics and other noisy data[J]. SIAM Journal on Computing, 2008, 38 (1): 97- 139.
doi: 10.1137/060651380 |
23 | RIVLIN T J . The chebyshev polynomials[M]. New York: Wiley, 1974. |
24 | ZHANG L H . Cryptanalysis of the public key encryption based on multiple chaotic systems[J]. Chaos, Solitons & Fractals, 2008, 37 (3): 669- 674. |
25 |
BURROWS M , ABADI M , NEEDHAM R M . A logic of authentication[J]. Proceedings of the Royal Society A:Mathematical, Physical and Engineering Sciences, 1989, 426 (1871): 233- 271.
doi: 10.1098/rspa.1989.0125 |
26 |
SUTRALA A K , DAS A K , ODELU V , et al. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems[J]. Computer Methods and Programs in Biomedicine, 2016, 135: 167- 185.
doi: 10.1016/j.cmpb.2016.07.028 |
[1] | 屈娟,李艳平. 基于动态身份的远程用户认证方案[J]. 山东大学学报(理学版), 2017, 52(1): 37-42. |
[2] | 查明明,王伟. FlowMonitor: Android隐私数据流向监控防护系统[J]. 山东大学学报(理学版), 2016, 51(9): 59-67. |
[3] | 朱智强,马可欣,孙磊. 一种基于零知识证明的远程桌面认证协议[J]. 山东大学学报(理学版), 2016, 51(9): 47-52. |
[4] | 朱斌瑞,秦静,韩斐. 基于生物特征的可搜索加密[J]. 山东大学学报(理学版), 2016, 51(5): 78-86. |
[5] | 倪亮1,2,3,陈恭亮3,李建华3. eCK模型的安全性分析[J]. J4, 2013, 48(7): 46-50. |
[6] | 汪定1,2,薛锋1,王立萍1,马春光2. 改进的具有PFS特性的口令认证密钥协商方案[J]. J4, 2012, 47(9): 19-25. |
[7] | 王鹃1,2,何琪1,严飞1,2,蒋万伟1,杨明1,王妍1. 一种以用户为中心的移动互联网身份管理及认证系统[J]. J4, 2012, 47(11): 12-17. |
[8] | 郑世慧,王少辉,张国艳 . 一个动态的安全有效的群密钥协商协议[J]. J4, 2006, 41(2): 89-93 . |
|