Presentation is loading. Please wait.

Presentation is loading. Please wait.

Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu

Similar presentations


Presentation on theme: "Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu"— Presentation transcript:

1 Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures Source: IEEE Transactions on Information Forensics and Security, Vol. 11, No. 9, pp. 2052–2064, 2016 Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu Speaker :Hsiao-Ling Wu Date :2018/02/22

2 Introduction (1/1)

3 Proposed scheme (1/7) Five phases: - the setup phase - the user registration phase - the server registration phase - the mutual authentication phase - the password change phase

4 Proposed scheme (2/7) the setup phase

5 Proposed scheme (3/7) the user registration phase

6 Proposed scheme (4/7) the server registration phase

7 Proposed scheme (5/7) the mutual authentication phase

8 Proposed scheme (6/7) the mutual authentication phase

9 Proposed scheme (7/7) the password change phase

10 Security analysis SR − 1: single registration
SR − 2: mutual authentication SR − 3: user anonymity SR − 4: un-traceability SR − 5: session key agreement SR − 6: perfect forward secrecy SR − 7: two-factor security SR − 8: not using the verifier table SR − 9: no on-line registration center SR − 10: resistance of various attacks 36. Y.-P. Liao and C.-M. Hsiao, “A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients,” Future Generat. Comput. Syst., vol. 29, no. 3, pp. 886–900, 2013. 37. W.-B. Hsieh and J.-S. Leu, “An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures,” J. Supercomput., vol. 70, no. 1, pp. 133–148, 2014. 38. R. Amin and G. P. Biswas, “Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment,” Wireless Pers. Commun., vol. 84, no. 1, pp. 439–462, 2015.

11 Performance Computation cost comparisons Communication cost comparison

12 Conclusions The security analysis shows that the proposed protocol is provably secure in the random oracle model This scheme satisfies the security requirements in the mobile system with multi-server architectures. The performance analysis results show that the proposed protocol has lower communication and computation costs.


Download ppt "Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu"

Similar presentations


Ads by Google