Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines

Yun Hsin Chuang, Chin Laung Lei, Hung Jr Shiu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

With the growing demand of user privacy preserving, there is an urgent requirement for designing a secure remote user authentication and key agreement (AKA) scheme with user privacy preserving. We survey and discuss present three-factor based remote user AKA schemes with user privacy preserving for multi-server environment, and we find that four of them have security defects. We will demonstrate that Ali-Pal scheme is vulnerable to malignant server attack and user untraceability attack, Chandrakar and Om's schemes are vulnerable to insider attacks, and Choi et al.'s scheme does not achieve user anonymity. We then analyze the relevant schemes to propose the guidelines for designing a secure AKA scheme with user privacy preserving for multi-server environment. This paper is helpful for designing a better AKA scheme.

Original languageEnglish
Title of host publicationProceedings - 2020 15th Asia Joint Conference on Information Security, AsiaJCIS 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages66-73
Number of pages8
ISBN (Electronic)9781728199221
DOIs
Publication statusPublished - 2020 Aug
Event15th Annual Asia Joint Conference on Information Security, AsiaJCIS 2020 - Taipei, Taiwan
Duration: 2020 Aug 202020 Aug 21

Publication series

NameProceedings - 2020 15th Asia Joint Conference on Information Security, AsiaJCIS 2020

Conference

Conference15th Annual Asia Joint Conference on Information Security, AsiaJCIS 2020
Country/TerritoryTaiwan
CityTaipei
Period20-08-2020-08-21

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Information Systems
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines'. Together they form a unique fingerprint.

Cite this