Download presentation
Presentation is loading. Please wait.
Published byMervin Shaw Modified over 5 years ago
1
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures Source: IEEE Transactions on Information Forensics and Security, Vol. 11, No. 9, pp. 2052–2064, 2016 Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu Speaker :Hsiao-Ling Wu Date :2018/02/22
2
Introduction (1/1)
3
Proposed scheme (1/7) Five phases: - the setup phase - the user registration phase - the server registration phase - the mutual authentication phase - the password change phase
4
Proposed scheme (2/7) the setup phase
5
Proposed scheme (3/7) the user registration phase
6
Proposed scheme (4/7) the server registration phase
7
Proposed scheme (5/7) the mutual authentication phase
8
Proposed scheme (6/7) the mutual authentication phase
9
Proposed scheme (7/7) the password change phase
10
Security analysis SR − 1: single registration
SR − 2: mutual authentication SR − 3: user anonymity SR − 4: un-traceability SR − 5: session key agreement SR − 6: perfect forward secrecy SR − 7: two-factor security SR − 8: not using the verifier table SR − 9: no on-line registration center SR − 10: resistance of various attacks 36. Y.-P. Liao and C.-M. Hsiao, “A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients,” Future Generat. Comput. Syst., vol. 29, no. 3, pp. 886–900, 2013. 37. W.-B. Hsieh and J.-S. Leu, “An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures,” J. Supercomput., vol. 70, no. 1, pp. 133–148, 2014. 38. R. Amin and G. P. Biswas, “Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment,” Wireless Pers. Commun., vol. 84, no. 1, pp. 439–462, 2015.
11
Performance Computation cost comparisons Communication cost comparison
12
Conclusions The security analysis shows that the proposed protocol is provably secure in the random oracle model This scheme satisfies the security requirements in the mobile system with multi-server architectures. The performance analysis results show that the proposed protocol has lower communication and computation costs.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.