TY - GEN
T1 - Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines
AU - Chuang, Yun Hsin
AU - Lei, Chin Laung
AU - Shiu, Hung Jr
N1 - Funding Information:
The authors thank the anonymous referees for their valuable comments. This work was supported by the Ministry of Science and Technology, Taiwan, under Grant MOST 107-2221-E-002-033-MY3 and Grant MOST 108-2221-E-002 -073 -MY3.
Publisher Copyright:
© 2020 IEEE.
PY - 2020/8
Y1 - 2020/8
N2 - With the growing demand of user privacy preserving, there is an urgent requirement for designing a secure remote user authentication and key agreement (AKA) scheme with user privacy preserving. We survey and discuss present three-factor based remote user AKA schemes with user privacy preserving for multi-server environment, and we find that four of them have security defects. We will demonstrate that Ali-Pal scheme is vulnerable to malignant server attack and user untraceability attack, Chandrakar and Om's schemes are vulnerable to insider attacks, and Choi et al.'s scheme does not achieve user anonymity. We then analyze the relevant schemes to propose the guidelines for designing a secure AKA scheme with user privacy preserving for multi-server environment. This paper is helpful for designing a better AKA scheme.
AB - With the growing demand of user privacy preserving, there is an urgent requirement for designing a secure remote user authentication and key agreement (AKA) scheme with user privacy preserving. We survey and discuss present three-factor based remote user AKA schemes with user privacy preserving for multi-server environment, and we find that four of them have security defects. We will demonstrate that Ali-Pal scheme is vulnerable to malignant server attack and user untraceability attack, Chandrakar and Om's schemes are vulnerable to insider attacks, and Choi et al.'s scheme does not achieve user anonymity. We then analyze the relevant schemes to propose the guidelines for designing a secure AKA scheme with user privacy preserving for multi-server environment. This paper is helpful for designing a better AKA scheme.
UR - http://www.scopus.com/inward/record.url?scp=85093365122&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85093365122&partnerID=8YFLogxK
U2 - 10.1109/AsiaJCIS50894.2020.00022
DO - 10.1109/AsiaJCIS50894.2020.00022
M3 - Conference contribution
AN - SCOPUS:85093365122
T3 - Proceedings - 2020 15th Asia Joint Conference on Information Security, AsiaJCIS 2020
SP - 66
EP - 73
BT - Proceedings - 2020 15th Asia Joint Conference on Information Security, AsiaJCIS 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 15th Annual Asia Joint Conference on Information Security, AsiaJCIS 2020
Y2 - 20 August 2020 through 21 August 2020
ER -