Two-factor authenticated key agreement protocol based on biometric feature and password
Papers|更新时间:2024-06-05
|
Two-factor authenticated key agreement protocol based on biometric feature and password
Journal on CommunicationsVol. 38, Issue 7, Pages: 89-95(2017)
作者机构:
1. 大理大学数学与计算机学院,云南 大理 671000
2. 北京邮电大学网络与交换技术国家重点实验室,北京 100049
3. 中国科学院大学国家计算机网络入侵防范中心,北京 100049
作者简介:
基金信息:
The National Natural Science Foundation of China(61462003);The National Natural Science Foundation of China(71462001);The National Natural Science Foundation of China(61272481);The National Natural Science Foundation of China(61572460);The National Key Research and Development Project(2016YFB0800703);Open Project Program of State Key Laborary of Networking and Switching Technology(SLNST-2016-2-25);Education Foundation of Yunnan Province(2016ZZX192)
Xiao-wei LI, Deng-qi YANG, Ben-hui CHEN, et al. Two-factor authenticated key agreement protocol based on biometric feature and password[J]. Journal on Communications, 2017, 38(7): 89-95.
DOI:
Xiao-wei LI, Deng-qi YANG, Ben-hui CHEN, et al. Two-factor authenticated key agreement protocol based on biometric feature and password[J]. Journal on Communications, 2017, 38(7): 89-95. DOI: 10.11959/j.issn.1000-436x.2017148.
Two-factor authenticated key agreement protocol based on biometric feature and password
A new two-factor authenticated key agreement protocol based on biometric feature and password was proposed.The protocol took advantages of the user’s biological information and password to achieve the secure communication without bringing the smart card.The biometric feature was not stored in the server by using the fuzzy extractor technique
so the sensitive information of the user cannot be leaked when the server was corrupted.The authentication messages of the user were protected by the server’s public key
so the protocol can resist the off-line dictionary attack which often appears in the authentication protocols based on password.The security of the proposed protocol was given in the random oracle model provided the elliptic computational Diffie-Hellman assumption holds.The performance analysis shows the proposed protocol has better security.
关键词
Keywords
references
HALEVI S , KRAWCZYK H . Public-key cryptography and password protocols [C ] // The 5th ACM Conference on Computer and Communications Security . 1998 : 122 - 131 .
BELLOVIN S M , MERRITT M . Encrypted key exchange:password based protocols secure against dictionary attacks [C ] // IEEE Security and Privacy . 1992 : 72 - 84 .
BELLARE M , POINTCHEVAL D , ROGAWAY P . Authenticated key exchange secure against dictionary attacks [J ] . Tecnologia Electronica E Informatica , 2000 : 139 - 155 .
JUANG W S , CHEN S T , LIAW H T . Robust and efficient password authenticated key agreement using smart cards [J ] . IEEE Transaction on Industrial Electronics , 2008 , 55 ( 6 ): 2551 - 2556 .
WANG D , WANG N , WANG P , et al . Preserving privacy for free:Efficient and provably secure two-factor authentication scheme with user anonymity [J ] . Information Sciences , 2015 , 321 ( 10 ): 162 - 178 .
MISHRA D , DAS A K , CHATURVEDI A , et al . A secure password-based authentication and key agreement scheme using smart cards [J ] . Journal of Information Security and Applications , 2015 , 23 ( 8 ): 28 - 43 .
LI X , NIU J , WANG Z , et al . Applying biometrics to design three-factor remote user authentication scheme with key agreement [J ] . Security and Communication Networks , 2014 , 7 ( 10 ): 1488 - 1497 .
GIRI D , SHERRATT R S , MAITRA T . A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB mass storage devices [J ] . IEEE Transactions on Consumer Electronics , 2016 , 62 ( 3 ): 283 - 291 .
DODIS Y , REYZIN L , SMITH A . Fuzzy extractors:how to generate strong keys from biometrics and other noisy data [C ] // Cryptology Eurocrypt 2004 . 2004 : 523 - 540 .
LI X W , ZHANG Y Q , ZHANG G F , et al . Strongly secure authenticated key agreement protocol using smart card [J ] . Acta Electronica Sinica , 2014 , 42 ( 8 ): 1587 - 1593 .