Efficient User Authentication and Key Agreement with User Privacy Protection
نویسندگان
چکیده
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to user authentication and key distribution, it is very useful for providing identity privacy for users. In this paper, we propose novel user authentication and key agreement schemes with privacy protection. We first propose a single-server scheme and then apply this scheme to a multi-server environment. The main merits include: (1) the privacy of users can be ensured; (2) a user can freely choose his own password; (3) the computation and communication cost is very low; (4) servers and users can authenticate each other; (5) it generates a session key agreed by the server and the user; (6) our proposed schemes are nonce-based schemes which does not have a serious timesynchronization problem.
منابع مشابه
Three Factor Authenticated Key Agreement Scheme for Telecare Medicine Information System Using Chebyshev Chaotic Maps
Telecare Medicine Information System (TMIS) is an effective technology in which patients can remain at their home and can get suggestions for medical treatment through the internet. One of the challenges faced by this system is security of medical data. Hence mutual authentication and session key establishment on a medical server between doctor and a patient are required for enhancing security ...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملAn Efficient Authenticated Key Agreement Protocol Based on Chaotic Maps with Privacy Protection using Smart Card
Key agreement is a crucial cryptographic primitive for building secure communication channels between two parties in a network. In the research literature a typical protocol aims for key secrecy and mutual authentication. However, there are many important practical scenarios where privacy protection is more desirable, especially for social network environment. Nowadays, social network environme...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملA Multi-server Authenticated Key Agreement Protocol with Privacy preserving Based on Chaotic Maps in Random Oracle Model
In the research literature, a typical authenticated key agreement protocol is designed to realize mutual authentication and key secrecy. In a network, as a crucial cryptographic primitive, key agreement can establish secure communication channels for communication entities. Meanwhile, the users privacy is particularity important, especially for multi-server authentication environment. Network p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 7 شماره
صفحات -
تاریخ انتشار 2008