skip to main content
10.1145/3330180.3330188acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccbnConference Proceedingsconference-collections
research-article

Enhancing Biometric and Mutual Verification in Multi-server Three-factor User Remote Authentication Scheme with Elliptic Curve Cryptography

Published: 12 April 2019 Publication History

Abstract

An elliptic curve based three-factor remote authentication scheme was proposed to provide more protections in multi-server network communications. Recently, many papers have proposed biometric-based three factor remote user authentication protocols (such as Chaturvedi et al.'s, Kumari et al.'s and Feng et al.'s schemes); their schemes achieved user anonymity as well as three-factor authentication. However, some of these schemes did not provide server's verification on biometric information and/or support registration center (RC) in authenticating users independently. Further, most of these papers did not provide strongly mutual authentication to pre-verify the possible threats of replay attacks. Therefore, we proposed a novel protocol using more secure and efficient building element, elliptic curve cryptography (ECC), to create the shared keys among the three parties, in which the remote server can verify biometric information and RC can confirm the registrations. The analysis shows that our proposed scheme has more security considerations than the previous researches.

References

[1]
Chaturvedi, A., Mishra, D., Jangirala, S., and Mukhopadhyay, S. 2017. A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme. In Journal of Information Security and Applications, 32, (2017), 15--26.
[2]
Dodis, Y., Reyzin, L., and Smith, A. 2004. A Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In International conference on the theory and applications of cryptographic techniques, (2004), 523--540.
[3]
Feng, Q., He, D., Zeadally, S., and Wang, H. 2018. Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. In Future Generation Computer Systems, 84 (2018), 239--251.
[4]
Karuppiah, M., Saravanan, R. 2015. Cryptanalysis and an improvement of new remote mutual authentication scheme using smart cards. in Journal of Discrete Mathematical Sciences and Cryptography, 18 (2015), 623--649.
[5]
Koblitz, N. 1987. Elliptic curve cryptosystems. In Mathematics of computation, 48 (1987), 203--209.
[6]
Kumari, S., Khan, M. K., and Li, X. 2014. An improved remote user authentication scheme with key agreement. In Computers and Electrical Engineering, 40 (2014) 1997--2012.
[7]
Kumari, S., Li, X., Wu, F., Das, A. K., Choo, K. K. R., Shen, J. 2017. Design of a provably secure biometrics-based multi-cloud-server authentication scheme. In Future Generation Computer Systems, 68 (2017), 320--330.
[8]
Li, X., Niu, J., Khan, M. K., and Liao, J. 2013. An enhanced smart card based remote user password authentication scheme. In Journal of Network and Computer Applications, 36 (2013), 1365--1371.
[9]
Li, X., Niu, J., Kumari, S., Wu, F., and Choo, K. K. R. 2018. A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. In Future Generation Computer Systems, 83 (2018), 607--618.
[10]
Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A. K., and Choo, K. K. R. 2018. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. In Journal of Network and Computer Applications, 103 (2018), 194--204.
[11]
Li, X., Niu, J., Wang, Z., Wu, F., and Chen, C. 2014. Applying biometrics to design three-factor remote user authentication scheme with key agreement. In Security Communication Networks, 7 (2014), 1488--1497.
[12]
Li, X., Xiong, Y., Ma, J., and Wang W. 2012. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. In Journal of Network and Computer Applications, 35 (2012), 763--769.
[13]
Mishra, D., Chaturvedi, A., and Mukhopadhyay, S. 2015. Design of a lightweight two-factor authentication scheme with smart card revocation. In Journal of Information Security and Applications, 23 (2015), 44--53.

Cited By

View all
  • (2022)A provably secure lightweight authentication protocol in mobile edge computing environmentsThe Journal of Supercomputing10.1007/s11227-022-04411-978:12(13893-13914)Online publication date: 1-Aug-2022
  • (2021)PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communicationJournal of Information Security and Applications10.1016/j.jisa.2021.10290061:COnline publication date: 1-Sep-2021

Index Terms

  1. Enhancing Biometric and Mutual Verification in Multi-server Three-factor User Remote Authentication Scheme with Elliptic Curve Cryptography

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCBN '19: Proceedings of the 7th International Conference on Communications and Broadband Networking
    April 2019
    76 pages
    ISBN:9781450362474
    DOI:10.1145/3330180
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • UPM: Universiti Putra Malaysia
    • NITech: Nagoya Institute of Technology
    • Iv. Javakhishvili Tbilisi State University, Georgia

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 April 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Anonymity
    2. Authentication Protocol
    3. Biometric
    4. Elliptic Curve Cryptography
    5. Network Security
    6. Smart Card

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCBN 2019

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A provably secure lightweight authentication protocol in mobile edge computing environmentsThe Journal of Supercomputing10.1007/s11227-022-04411-978:12(13893-13914)Online publication date: 1-Aug-2022
    • (2021)PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communicationJournal of Information Security and Applications10.1016/j.jisa.2021.10290061:COnline publication date: 1-Sep-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media