Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment

Author(s):  
Ping Wang ◽  
Zijian Zhang ◽  
Ding Wang
2020 ◽  
Vol 88 ◽  
pp. 101619 ◽  
Author(s):  
Ding Wang ◽  
Xizhe Zhang ◽  
Zijian Zhang ◽  
Ping Wang

2014 ◽  
Vol 543-547 ◽  
pp. 3343-3347
Author(s):  
Xue Lei Li ◽  
Qiao Yan Wen ◽  
Wen Min Li ◽  
Hua Zhang ◽  
Zheng Ping Jin

In this paper, we analyze and point out several weaknesses in the dynamic ID-based remote user authentication schemes using smart card for multi-server environments, and present the countermeasures to enhance the security of the schemes. Taking Li et al.'s scheme for instance, we demonstrate that their scheme does not provide forward secrecy and key privacy for the session keys, and cannot resist offline password guessing attack. Furthermore, the reasons of these security weaknesses are analyzed through extending the attacks to its predecessors. Finally, the improved ideas of local verification and authenticated Diffie-Hellman key agreement are presented to overcome the weaknesses mentioned above.


2019 ◽  
Vol 48 (2) ◽  
pp. 211-224
Author(s):  
Azeem Irshad ◽  
Shehzad Ashraf Ch ◽  
Muhammad Shafiq ◽  
Muhammad Usman ◽  
Muhammad Asif ◽  
...  

The remote authentication has been advancing with the growth of online services being offered on remotely basis. This calls for an optimal authentication framework other than single-server authentication. In this connection, the multi-server authentication architecture has been introduced in the literature that enables the users to avail variety of services of various servers, using a single pair of identity and password. Lately, we have witnessed a few multi-server authentication schemes in the literature, although security with loopholes. One of those multi-server authentication schemes has been presented by Chang et al. recently. Our analysis shows that the Chang et al. is vulnerable to impersonation attack, stolen smart card attack. In this study, we have reviewed the protocol thoroughly, and proposed an improved model, that is resistant to all known and identified attacks. The formal and informal security analysis for proposed model is also presented in this study, besides performance and its evaluation analysis.


2010 ◽  
Vol 11 (12) ◽  
pp. 989-997
Author(s):  
Horng-Twu Liaw ◽  
Chih-Ta Yen ◽  
Meng-Yu Chiu ◽  
Li-Lin Hsiao

Sign in / Sign up

Export Citation Format

Share Document