Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each other and generate a session key for the subsequent communications. With the rapid development of low-power and highly-efficient networks, such as pervasive and mobile computing network in recent years, many ef...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2017-06, Vol.12 (6), p.1382-1392 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1392 |
---|---|
container_issue | 6 |
container_start_page | 1382 |
container_title | IEEE transactions on information forensics and security |
container_volume | 12 |
creator | Qi Xie Wong, Duncan S. Guilin Wang Xiao Tan Kefei Chen Liming Fang |
description | Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each other and generate a session key for the subsequent communications. With the rapid development of low-power and highly-efficient networks, such as pervasive and mobile computing network in recent years, many efficient AKE protocols have been proposed to achieve user privacy and authentication in the communications. Besides secure session key establishment, those AKE protocols offer some other useful functionalities, such as two-factor user authentication and mutual authentication. However, most of them have one or more weaknesses, such as vulnerability against lost-smart-card attack, offline dictionary attack, de-synchronization attack, or the lack of forward secrecy, and user anonymity or untraceability. Furthermore, an AKE scheme under the public key infrastructure may not be suitable for light-weight computational devices, and the security model of AKE does not capture user anonymity and resist lost-smart-card attack. In this paper, we propose a novel dynamic ID-based anonymous two-factor AKE protocol, which addresses all the above issues. Our protocol also supports smart card revocation and password update without centralized storage. Further, we extend the security model of AKE to support user anonymity and resist lost-smart-card attack, and the proposed scheme is provably secure in extended security model. The low-computational and bandwidth cost indicates that our protocol can be deployed for pervasive computing applications and mobile communications in practice. |
doi_str_mv | 10.1109/TIFS.2017.2659640 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1876614617</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7835163</ieee_id><sourcerecordid>1876614617</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-103550ade89e6a5ccefe012ef58aa3bb606fceeadae47fa20bdcdc2c20cb18a33</originalsourceid><addsrcrecordid>eNo9kE1Lw0AQhhdRsFZ_gHhZ8Jy6s5tskmPthxYrCq14DJvNxKak2brZVPPvTW3paYbhed-Bh5BbYAMAFj8sZ9PFgDMIB1wGsfTZGelBEEhPMg7npx3EJbmq6zVjvg8y6pHduzU7lZYtXaBuLNJxW6lNoels7D2qGjM6rEzVbkxT0-WP8aZKO2PpsHErrFyhleuQF2zp5FevVPWFtCt0RpuSfhZu1Z0dVlnH_NcXrqWvJsPymlzkqqzx5jj75GM6WY6evfnb02w0nHuax8J5wEQQMJVhFKNUgdaYIwOOeRApJdJUMplrRJUp9MNccZZmOtNcc6ZTiJQQfXJ_6N1a891g7ZK1aWzVvUwgCqUEX0LYUXCgtDV1bTFPtrbYKNsmwJK93mSvN9nrTY56u8zdIVMg4okPIxGAFOIPO2x46A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1876614617</pqid></control><display><type>article</type><title>Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model</title><source>IEEE Electronic Library (IEL)</source><creator>Qi Xie ; Wong, Duncan S. ; Guilin Wang ; Xiao Tan ; Kefei Chen ; Liming Fang</creator><creatorcontrib>Qi Xie ; Wong, Duncan S. ; Guilin Wang ; Xiao Tan ; Kefei Chen ; Liming Fang</creatorcontrib><description>Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each other and generate a session key for the subsequent communications. With the rapid development of low-power and highly-efficient networks, such as pervasive and mobile computing network in recent years, many efficient AKE protocols have been proposed to achieve user privacy and authentication in the communications. Besides secure session key establishment, those AKE protocols offer some other useful functionalities, such as two-factor user authentication and mutual authentication. However, most of them have one or more weaknesses, such as vulnerability against lost-smart-card attack, offline dictionary attack, de-synchronization attack, or the lack of forward secrecy, and user anonymity or untraceability. Furthermore, an AKE scheme under the public key infrastructure may not be suitable for light-weight computational devices, and the security model of AKE does not capture user anonymity and resist lost-smart-card attack. In this paper, we propose a novel dynamic ID-based anonymous two-factor AKE protocol, which addresses all the above issues. Our protocol also supports smart card revocation and password update without centralized storage. Further, we extend the security model of AKE to support user anonymity and resist lost-smart-card attack, and the proposed scheme is provably secure in extended security model. The low-computational and bandwidth cost indicates that our protocol can be deployed for pervasive computing applications and mobile communications in practice.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2017.2659640</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>anonymity ; Authentication ; Cybersecurity ; Dictionaries ; dynamic ID ; password authentication ; Privacy ; Protocols ; Security ; Servers ; smart card ; Smart cards ; Ubiquitous computing ; Vulnerability</subject><ispartof>IEEE transactions on information forensics and security, 2017-06, Vol.12 (6), p.1382-1392</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-103550ade89e6a5ccefe012ef58aa3bb606fceeadae47fa20bdcdc2c20cb18a33</citedby><cites>FETCH-LOGICAL-c293t-103550ade89e6a5ccefe012ef58aa3bb606fceeadae47fa20bdcdc2c20cb18a33</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7835163$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7835163$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Qi Xie</creatorcontrib><creatorcontrib>Wong, Duncan S.</creatorcontrib><creatorcontrib>Guilin Wang</creatorcontrib><creatorcontrib>Xiao Tan</creatorcontrib><creatorcontrib>Kefei Chen</creatorcontrib><creatorcontrib>Liming Fang</creatorcontrib><title>Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each other and generate a session key for the subsequent communications. With the rapid development of low-power and highly-efficient networks, such as pervasive and mobile computing network in recent years, many efficient AKE protocols have been proposed to achieve user privacy and authentication in the communications. Besides secure session key establishment, those AKE protocols offer some other useful functionalities, such as two-factor user authentication and mutual authentication. However, most of them have one or more weaknesses, such as vulnerability against lost-smart-card attack, offline dictionary attack, de-synchronization attack, or the lack of forward secrecy, and user anonymity or untraceability. Furthermore, an AKE scheme under the public key infrastructure may not be suitable for light-weight computational devices, and the security model of AKE does not capture user anonymity and resist lost-smart-card attack. In this paper, we propose a novel dynamic ID-based anonymous two-factor AKE protocol, which addresses all the above issues. Our protocol also supports smart card revocation and password update without centralized storage. Further, we extend the security model of AKE to support user anonymity and resist lost-smart-card attack, and the proposed scheme is provably secure in extended security model. The low-computational and bandwidth cost indicates that our protocol can be deployed for pervasive computing applications and mobile communications in practice.</description><subject>anonymity</subject><subject>Authentication</subject><subject>Cybersecurity</subject><subject>Dictionaries</subject><subject>dynamic ID</subject><subject>password authentication</subject><subject>Privacy</subject><subject>Protocols</subject><subject>Security</subject><subject>Servers</subject><subject>smart card</subject><subject>Smart cards</subject><subject>Ubiquitous computing</subject><subject>Vulnerability</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1Lw0AQhhdRsFZ_gHhZ8Jy6s5tskmPthxYrCq14DJvNxKak2brZVPPvTW3paYbhed-Bh5BbYAMAFj8sZ9PFgDMIB1wGsfTZGelBEEhPMg7npx3EJbmq6zVjvg8y6pHduzU7lZYtXaBuLNJxW6lNoels7D2qGjM6rEzVbkxT0-WP8aZKO2PpsHErrFyhleuQF2zp5FevVPWFtCt0RpuSfhZu1Z0dVlnH_NcXrqWvJsPymlzkqqzx5jj75GM6WY6evfnb02w0nHuax8J5wEQQMJVhFKNUgdaYIwOOeRApJdJUMplrRJUp9MNccZZmOtNcc6ZTiJQQfXJ_6N1a891g7ZK1aWzVvUwgCqUEX0LYUXCgtDV1bTFPtrbYKNsmwJK93mSvN9nrTY56u8zdIVMg4okPIxGAFOIPO2x46A</recordid><startdate>20170601</startdate><enddate>20170601</enddate><creator>Qi Xie</creator><creator>Wong, Duncan S.</creator><creator>Guilin Wang</creator><creator>Xiao Tan</creator><creator>Kefei Chen</creator><creator>Liming Fang</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20170601</creationdate><title>Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model</title><author>Qi Xie ; Wong, Duncan S. ; Guilin Wang ; Xiao Tan ; Kefei Chen ; Liming Fang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-103550ade89e6a5ccefe012ef58aa3bb606fceeadae47fa20bdcdc2c20cb18a33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>anonymity</topic><topic>Authentication</topic><topic>Cybersecurity</topic><topic>Dictionaries</topic><topic>dynamic ID</topic><topic>password authentication</topic><topic>Privacy</topic><topic>Protocols</topic><topic>Security</topic><topic>Servers</topic><topic>smart card</topic><topic>Smart cards</topic><topic>Ubiquitous computing</topic><topic>Vulnerability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Qi Xie</creatorcontrib><creatorcontrib>Wong, Duncan S.</creatorcontrib><creatorcontrib>Guilin Wang</creatorcontrib><creatorcontrib>Xiao Tan</creatorcontrib><creatorcontrib>Kefei Chen</creatorcontrib><creatorcontrib>Liming Fang</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Qi Xie</au><au>Wong, Duncan S.</au><au>Guilin Wang</au><au>Xiao Tan</au><au>Kefei Chen</au><au>Liming Fang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2017-06-01</date><risdate>2017</risdate><volume>12</volume><issue>6</issue><spage>1382</spage><epage>1392</epage><pages>1382-1392</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each other and generate a session key for the subsequent communications. With the rapid development of low-power and highly-efficient networks, such as pervasive and mobile computing network in recent years, many efficient AKE protocols have been proposed to achieve user privacy and authentication in the communications. Besides secure session key establishment, those AKE protocols offer some other useful functionalities, such as two-factor user authentication and mutual authentication. However, most of them have one or more weaknesses, such as vulnerability against lost-smart-card attack, offline dictionary attack, de-synchronization attack, or the lack of forward secrecy, and user anonymity or untraceability. Furthermore, an AKE scheme under the public key infrastructure may not be suitable for light-weight computational devices, and the security model of AKE does not capture user anonymity and resist lost-smart-card attack. In this paper, we propose a novel dynamic ID-based anonymous two-factor AKE protocol, which addresses all the above issues. Our protocol also supports smart card revocation and password update without centralized storage. Further, we extend the security model of AKE to support user anonymity and resist lost-smart-card attack, and the proposed scheme is provably secure in extended security model. The low-computational and bandwidth cost indicates that our protocol can be deployed for pervasive computing applications and mobile communications in practice.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2017.2659640</doi><tpages>11</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2017-06, Vol.12 (6), p.1382-1392 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_proquest_journals_1876614617 |
source | IEEE Electronic Library (IEL) |
subjects | anonymity Authentication Cybersecurity Dictionaries dynamic ID password authentication Privacy Protocols Security Servers smart card Smart cards Ubiquitous computing Vulnerability |
title | Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T17%3A53%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Provably%20Secure%20Dynamic%20ID-Based%20Anonymous%20Two-Factor%20Authenticated%20Key%20Exchange%20Protocol%20With%20Extended%20Security%20Model&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Qi%20Xie&rft.date=2017-06-01&rft.volume=12&rft.issue=6&rft.spage=1382&rft.epage=1392&rft.pages=1382-1392&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2017.2659640&rft_dat=%3Cproquest_RIE%3E1876614617%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1876614617&rft_id=info:pmid/&rft_ieee_id=7835163&rfr_iscdi=true |