4.7 Article

Secure Key Agreement and Key Protection for Mobile Device User Authentication

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2018.2850299

关键词

Authentication; two-party; mobile; anonymity

资金

  1. National Natural Science Foundation of China [61772377, 61572379, 61501333, 61572370]
  2. Natural Science Foundation of Hubei Province of China [2015CFA068, 2017CFA007]

向作者/读者索取更多资源

As mobile devices ownership becomes more prevalent (e.g., a user owns multiple mobile devices), the capability to offer secure and user friendly authentication becomes increasingly important. A large number of identity-based user authentication mechanisms for the wireless mobile environment have been proposed. However, they are not generally designed for situations where a user's private key and some other sensitive data can be exposed if his/her mobile device is remotely or physically controlled by an attacker. Threshold secret sharing is one of the solutions to this problem, but it is limited in the requirement that there should exist an honest third-party to hold the complete key after the secret reconstruction process. Therefore, in this paper, we consider the special case that only two devices (i.e., no honest party) at the user's side jointly perform user authentication with a server, and neither device can successfully complete the authentication process alone. Moreover, the key reconstruction is not needed during authentication so that neither device can hold a complete key. We then analyze the security of the proposed protocol and show that it satisfies all known security requirements in practical applications, particularly the key exposure attack resistance. The performance analysis of the proposed protocol is also presented to demonstrate its practicality.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据