Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
- 26 January 2017
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Forensics and Security
- Vol. 12 (6), 1382-1392
- https://doi.org/10.1109/tifs.2017.2659640
Abstract
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each other and generate a session key for the subsequent communications. With the rapid development of low-power and highly-efficient networks, such as pervasive and mobile computing network in recent years, many efficient AKE protocols have been proposed to achieve user privacy and authentication in the communications. Besides secure session key establishment, those AKE protocols offer some other useful functionalities, such as two-factor user authentication and mutual authentication. However, most of them have one or more weaknesses, such as vulnerability against lost-smart-card attack, offline dictionary attack, de-synchronization attack, or the lack of forward secrecy, and user anonymity or untraceability. Furthermore, an AKE scheme under the public key infrastructure may not be suitable for light-weight computational devices, and the security model of AKE does not capture user anonymity and resist lost-smart-card attack. In this paper, we propose a novel dynamic ID-based anonymous two-factor AKE protocol, which addresses all the above issues. Our protocol also supports smart card revocation and password update without centralized storage. Further, we extend the security model of AKE to support user anonymity and resist lost-smart-card attack, and the proposed scheme is provably secure in extended security model. The low-computational and bandwidth cost indicates that our protocol can be deployed for pervasive computing applications and mobile communications in practice.Keywords
Funding Information
- Natural Science Foundation of Zhejiang Province (LZ12F02005)
- Major State Basic Research Development (973) Program of China (2013CB834205)
This publication has 37 references indexed in Scilit:
- Dynamic ID-based remote user password authentication schemes using smart cards: A reviewJournal of Network and Computer Applications, 2012
- An improved dynamic ID-based remote user authentication with key agreement schemeComputers and Electrical Engineering, 2012
- Improvements of Juang 's Password-Authenticated Key Agreement Scheme Using Smart CardsIEEE Transactions on Industrial Electronics, 2009
- A survey of anonymity in wireless communication systemsSecurity and Communication Networks, 2008
- Two-factor mutual authentication based on smart cards and passwordsJournal of Computer and System Sciences, 2008
- Robust remote authentication scheme with smart cardsComputers & Security, 2005
- A dynamic ID-based remote user authentication schemeIEEE Transactions on Consumer Electronics, 2004
- A modified remote user authentication scheme using smart cardsIEEE Transactions on Consumer Electronics, 2003
- Examining smart-card security under the threat of power analysis attacksIEEE Transactions on Computers, 2002
- A new remote user authentication scheme using smart cardsIEEE Transactions on Consumer Electronics, 2000