https://scholars.lib.ntu.edu.tw/handle/123456789/607042
標題: | How to design a secure anonymous authentication and key agreement protocol for multi-server environments and prove its security | 作者: | Chuang Y.-H Lei C.-L Shiu H.-J. CHIN-LAUNG LEI |
關鍵字: | Anonymity;Authentication;Biometric;Key exchange;Multi-server;Privacy;Threefactor authentication | 公開日期: | 2021 | 卷: | 13 | 期: | 9 | 來源出版物: | Symmetry | 摘要: | An anonymous authentication and key agreement (AAKA) protocol provides anonymous members symmetric authentication and establishes a symmetric session key for secure communication in public networks. Today, numerous popular remote services are based on multi-server architecture, such as the internet of things (IoT), smart cities, cloud services, vehicular ad hoc networks (VANET), and telecare medicine information systems (TMIS). Many researchers have attempted to design AAKA protocols in multi-server environments for various applications. However, many of these have security defects, even if they have so-called “formal” security proofs. In this paper, we analyze related AAKA protocols to identify the common design defects, expound the process of designing secure AAKA protocols, and explain why the present AAKA protocols still suffer attacks, despite having security proofs. We instruct readers on how to design a secure AAKA protocol and how to prove the security. This paper will therefore be helpful for the design of new AAKA protocols, and for ensuring their security. ? 2021 by the authors. Licensee MDPI, Basel, Switzerland. |
URI: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85114693129&doi=10.3390%2fsym13091629&partnerID=40&md5=c243eb743de7fafb24a3ff127981bafe https://scholars.lib.ntu.edu.tw/handle/123456789/607042 |
ISSN: | 20738994 | DOI: | 10.3390/sym13091629 |
顯示於: | 電機工程學系 |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。