JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (5): 44-51.doi: 10.6040/j.issn.1671-9352.2.2018.207
• • Previous Articles Next Articles
Juan QU1(),Yu-ming FENG2,Yan-ping LI3,Li LI1
CLC Number:
1 |
LAMPORT L . Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24 (11): 770- 772.
doi: 10.1145/358790.358797 |
2 | FAN C I , CHAN Y C , ZHANG Z K . Robust remote authentication scheme with smart cards[J]. Computers & Security, 2005, 24 (8): 619- 628. |
3 | DAS A K . A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems[J]. Journal of Medicine System, 2015, 39 (3): 1- 20. |
4 | HE D B , ZEADALLY S , KUMAR N , et al. Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures[J]. IEEE Transactions on Information Forensics & Security, 2016, 11 (9): 2052- 2064. |
5 |
JIANG Q , CHEN Z R , LI B Y , et al. Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems[J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 (4): 1061- 1073.
doi: 10.1007/s12652-017-0516-2 |
6 |
LI X , XIONG Y P , MA J , et al. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards[J]. Journal of Network and Computer Applications, 2012, 35 (2): 763- 769.
doi: 10.1016/j.jnca.2011.11.009 |
7 | 李艳平, 刘小雪, 屈娟, 等. 基于智能卡的多服务器远程匿名认证密钥协商协议[J]. 四川大学学报(工程科学版), 2016, 48 (1): 91- 98. |
LI Yanping , LIU Xiaoxue , QU Juan , et al. Multi-server anonymous remote authenticated key agreement protocol based on smart card[J]. Journal of Sichuan University(Engineering Science Edition), 2016, 48 (1): 91- 98. | |
8 |
XUE K P , HONG P L , MA C S . A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture[J]. Journal of Computer and System Sciences, 2014, 80 (1): 195- 206.
doi: 10.1016/j.jcss.2013.07.004 |
9 |
GUPTA P C , DHAR J . Hash based multi-server key exchange protocol using smart card[J]. Wireless Personal Communications, 2016, 87 (1): 225- 244.
doi: 10.1007/s11277-015-3040-8 |
10 |
LU Y R , LI L X , PENG H P , et al. A biometrics and smart cards-based authentication scheme for multi-server environments[J]. Security and Communication Networks, 2015, 8 (17): 3219- 3228.
doi: 10.1002/sec.v8.17 |
11 |
CHANDRAKAR P , OM H . A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC[J]. Computer Communications, 2017, 110: 26- 34.
doi: 10.1016/j.comcom.2017.05.009 |
12 | GUO H , WANG P , ZHANG X Y , et al. A robust anonymous biometirc-based authenticated key agreement scheme for multi-server environments[J]. PLoS one, 2017, 12 (11): 1- 19. |
13 | YANG L , Zhang Z M . Cryptanalysis and improvement of a biometric-based authentication and key agreement scheme for multi-server environments[J]. PLoS one, 2017, 13 (3): 1- 27. |
14 |
LU Y R , LI L X , PENG H P , et al. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem[J]. Journal of Medical Systems, 2015, 39 (3): 32.
doi: 10.1007/s10916-015-0221-7 |
15 |
YEH K H . A provably secure multi-server based authentication scheme[J]. Wireless Personal Communications, 2014, 79 (3): 1621- 1634.
doi: 10.1007/s11277-014-1948-z |
16 |
PIPPAL R S , JAIDHAR C D , TAPASWI S . Robust smart card authentication scheme for multi-server architecture[J]. Wireless Personal Communications, 2013, 72 (1): 729- 745.
doi: 10.1007/s11277-013-1039-6 |
17 |
MISHRA D . Design and analysis of a provably secure multi-server authentication scheme[J]. Wireless Personal Communications, 2016, 86 (3): 1095- 1119.
doi: 10.1007/s11277-015-2975-0 |
18 | 汪定, 李文婷, 王平, 等. 对三个多服务器环境下匿名认证协议的分析[J]. 软件学报, 2018, 29 (7): 1937- 1952. |
WANG Ding , LI Wenting , WANG Ping , et al. Crytanalysis of three anonymous authentication schemes for multi-server environment[J]. Journal of Software, 2018, 29 (7): 1937- 1952. | |
19 |
REDDY A G , YOON E J , DAS A K , et al. Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment[J]. IEEE Access, 2017, 5: 3622- 3639.
doi: 10.1109/ACCESS.2017.2666258 |
20 |
万涛, 刘遵雄, 马建峰, 等. 多服务器架构下认证与密钥协商协议[J]. 计算机研究与发展, 2016, 53 (11): 2446- 2453.
doi: 10.7544/issn1000-1239.2016.20150107 |
WAN Tao , LIU Zunxiong , MA Jianfeng , et al. Authentication and key agreement protocol for multi-server architecture[J]. Journal of Computer Research and Development, 2016, 53 (11): 2446- 2453.
doi: 10.7544/issn1000-1239.2016.20150107 |
|
21 | AMIN R . Cryptanalysis and efficient dynamic ID based remote user authentication scheme in multi-server environment using smart card[J]. International Journal of Network Security, 2016, 18 (1): 172- 181. |
22 |
DODIS Y , OSTROVSKY R , REYZIN L , et al. Fuzzy extractors:how to generate strong keys from biometrics and other noisy data[J]. SIAM Journal on Computing, 2008, 38 (1): 97- 139.
doi: 10.1137/060651380 |
23 | RIVLIN T J . The chebyshev polynomials[M]. New York: Wiley, 1974. |
24 | ZHANG L H . Cryptanalysis of the public key encryption based on multiple chaotic systems[J]. Chaos, Solitons & Fractals, 2008, 37 (3): 669- 674. |
25 |
BURROWS M , ABADI M , NEEDHAM R M . A logic of authentication[J]. Proceedings of the Royal Society A:Mathematical, Physical and Engineering Sciences, 1989, 426 (1871): 233- 271.
doi: 10.1098/rspa.1989.0125 |
26 |
SUTRALA A K , DAS A K , ODELU V , et al. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems[J]. Computer Methods and Programs in Biomedicine, 2016, 135: 167- 185.
doi: 10.1016/j.cmpb.2016.07.028 |
[1] | YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22. |
[2] | QU Juan, LI Yan-ping. A secure dynamic identity-based remote user authentication scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(1): 37-42. |
[3] | ZHU Bin-rui, QIN Jing, HAN Fei. Searchable encryption scheme based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 78-86. |
[4] | NI Liang1,2,3, CHEN Gong-liang3, LI Jian-hua3. Security analysis of the eCK model [J]. J4, 2013, 48(7): 46-50. |
[5] | ZHENG Shi-hui,WANG Shao-hui and ZHANG Guo-yan . A dynamic secure and efficient group key agreement protocol [J]. J4, 2006, 41(2): 89-93 . |
|