Skip to main content
Log in

An Improved Server Validation Scheme for Multi-server Infrastructure

  • Short Communication
  • Published:
National Academy Science Letters Aims and scope Submit manuscript

Abstract

An improved server validation scheme for a multi-server infrastructure has been introduced. In this scheme, each member involved in communication has to prove its validation before any exchange of information bits. This introduced scheme also secures the server against phishing and other similar attacks. Dynamic properties of the group are handled with ease, making the scheme suitable for real-life applications. Major achieved highlights of the method are that user privacy is respected without requiring any serious time synchronization.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

References

  1. Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209

    Article  MathSciNet  Google Scholar 

  2. Hegde C, Manu S, Shenoy PD, Venugopal KR, Patnaik LM (2008) Secure authentication using image processing and visual cryptography for banking applications. In: Advanced computing and communications, 2008. ADCOM 2008. 16th international conference on 14–17 Dec. 2008, Chennai, India

  3. Amin R, Islam S, Khan MK, Karati A, Giri D, Kumari S (2017) A two-factor RSA-based robust authentication system for multiserver environments. Secur Commun Netw 13:1–15

    Article  CAS  Google Scholar 

  4. Eason G, Noble B, Sneddon IN (1955) On certain integrals of Lipschitz–Hankel type involving products of Bessel functions. Philos Trans R S Lond A247:529–551

    ADS  MathSciNet  MATH  Google Scholar 

  5. Naor M, Shamir A (1995) Visual cryptography advances in cryptography-EUROCRYPT’94. Lect Notes Comput Sci 950:1–12

    Article  Google Scholar 

  6. Li X, Niu J, Kumari S, Islam SH, Wu F, Khan MK, Das AK (2016) A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wirel Pers Commun 89(2):569–597

    Article  Google Scholar 

  7. Kumar P, Sabitha S (2015) User authentication using visual cryptography. In: 2015 international conference on control, communication and computing india (ICCC), 19–21 November 2015, Trivandrum, India

  8. Miller V (1986) Use of elliptic curves in cryptography. Adv Cryptol 218:417–426

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Himanshu Monga.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Monga, H., Girdhar, N. An Improved Server Validation Scheme for Multi-server Infrastructure. Natl. Acad. Sci. Lett. 43, 43–47 (2020). https://doi.org/10.1007/s40009-019-00813-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40009-019-00813-1

Keywords

Navigation