Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures Source: IEEE Transactions on Information Forensics and Security, Vol. 11, No. 9, pp. 2052–2064, 2016 Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu Speaker :Hsiao-Ling Wu Date :2018/02/22
Introduction (1/1)
Proposed scheme (1/7) Five phases: - the setup phase - the user registration phase - the server registration phase - the mutual authentication phase - the password change phase
Proposed scheme (2/7) the setup phase
Proposed scheme (3/7) the user registration phase
Proposed scheme (4/7) the server registration phase
Proposed scheme (5/7) the mutual authentication phase
Proposed scheme (6/7) the mutual authentication phase
Proposed scheme (7/7) the password change phase
Security analysis SR − 1: single registration SR − 2: mutual authentication SR − 3: user anonymity SR − 4: un-traceability SR − 5: session key agreement SR − 6: perfect forward secrecy SR − 7: two-factor security SR − 8: not using the verifier table SR − 9: no on-line registration center SR − 10: resistance of various attacks 36. Y.-P. Liao and C.-M. Hsiao, “A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients,” Future Generat. Comput. Syst., vol. 29, no. 3, pp. 886–900, 2013. 37. W.-B. Hsieh and J.-S. Leu, “An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures,” J. Supercomput., vol. 70, no. 1, pp. 133–148, 2014. 38. R. Amin and G. P. Biswas, “Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment,” Wireless Pers. Commun., vol. 84, no. 1, pp. 439–462, 2015.
Performance Computation cost comparisons Communication cost comparison
Conclusions The security analysis shows that the proposed protocol is provably secure in the random oracle model This scheme satisfies the security requirements in the mobile system with multi-server architectures. The performance analysis results show that the proposed protocol has lower communication and computation costs.