Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment
- 232 Downloads
With non-stop development of e-commerce and different internet-based applications’ demands, service providers include many physical servers scattering all over the world. If some users would like to use various services, they have to repeatedly register. Therefore, they must remember all these information such as, user-names or passwords. To solve this problem, many authentication schemes in multi-server environment are proposed. Furthermore, to prevent the adversary from keeping track of another user when he or she logins, many schemes apply dynamic identity, but they have some limitations with popular kinds of attacks such as, replay attack, impersonation attack, or man-in-the-middle attack... In 2014, Yeh (Department of Information Management, National Dong Hwa University) proposed multi-server scheme using Rivest–Shamir–Adleman (RSA). However, we discover this scheme cannot achieve two basic properties, mutual authentication and session-key agreement. In this paper, we concretely demonstrate that discovery and propose a different provable version using elliptic curve cryptosystem in multi-server environment which overcomes the limitation of Yeh’s scheme and satisfies security and efficiency.
KeywordsAuthentication Multi-server Dynamic identity User anonymity
This research is funded by Vietnam National University Ho Chi Minh City (VNU-HCM) under Grant No. B2015-18-01.
- 6.Chang, C. C., & Lee, J. S. (2004). An efficient and secure multi-server password authentication scheme using smart-cards. In Proceedings of the third international conference on cyber worlds (pp. 417–422).Google Scholar
- 7.Ku, W. C., Chuang, H. M., Chiang, M. H., & Chang, K. T. (2005). Weaknesses of a multi-server password authenticated key agreement scheme. In Proceedings of 2005 national computer symposium (pp. 1–5).Google Scholar
- 10.Lee, C. C., Lin, T. H., & Chang, R. X. (2011). A secure dynamic ID based remote user authentication scheme for multi-server environment using smart-cards. Expert Systems with Applications, 38(11), 13863–13870.Google Scholar
- 15.Bellare, M., Pointcheval, D., & Rogaway, P. (2000). Authenticated key exchange secure against dictionary attacks. In Proceedings of EUROCRYPT (Vol. 1807, pp. 140–156).Google Scholar