10
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication scheme for multi-server environments. They claimed that their scheme can resist several types of attacks. However, through careful analysis, we find that Li et al.’s scheme is vulnerable to stolen smart card and off-line dictionary attacks, replay attacks, impersonation attacks and server spoofing attacks. By analyzing other similar schemes, we find that a certain type of dynamic ID-based multi-server authentication scheme in which only hash functions are used and whereby no registration center participates in the authentication and session key agreement phase faces difficulties in providing perfectly efficient and secure authentication. To compensate for these shortcomings, we propose a novel dynamic ID-based remote user authentication scheme for multi-server environments based on pairing and self-certified public keys. Security and performance analyses show that the proposed scheme is secure against various attacks and has many excellent features.

          Related collections

          Most cited references38

          • Record: found
          • Abstract: not found
          • Article: not found

          An efficient biometrics-based remote user authentication scheme using smart cards

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A secure dynamic ID based remote user authentication scheme for multi-server environment

                Bookmark

                Author and article information

                Contributors
                Role: ConceptualizationRole: Formal analysisRole: Funding acquisitionRole: Investigation
                Role: Data curation
                Role: MethodologyRole: Project administration
                Role: SoftwareRole: Supervision
                Role: ResourcesRole: Software
                Role: Writing – review & editing
                Role: Editor
                Journal
                PLoS One
                PLoS ONE
                plos
                plosone
                PLoS ONE
                Public Library of Science (San Francisco, CA USA )
                1932-6203
                2018
                9 October 2018
                : 13
                : 10
                : e0202657
                Affiliations
                [1 ] Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
                [2 ] College of Computer, National University of Defense Technology, Hunan Changsha, China
                [3 ] School of Software Engineering, Yantai Vocational College, Shandong Yantai, China
                [4 ] Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China
                [5 ] College of Computer Science and Engineering, Northwest Normal University, Gansu Lanzhou, China
                Victoria University, AUSTRALIA
                Author notes

                Competing Interests: The authors have declared that no competing interests exist.

                Author information
                http://orcid.org/0000-0001-6381-1984
                Article
                PONE-D-17-44090
                10.1371/journal.pone.0202657
                6177128
                30300362
                9cedb50a-965b-459c-b68d-01ad22b73c35
                © 2018 Li et al

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

                History
                : 18 December 2017
                : 15 July 2018
                Page count
                Figures: 3, Tables: 3, Pages: 19
                Funding
                Funded by: NSFC
                Award ID: .61672020, 61662069, 61472433, 61702309, 61572153
                Award Recipient :
                Funded by: National Key Research and Development Plan
                Award ID: 2017YFB0801804, 2017YFB0802204
                Award Recipient :
                Funded by: Project funded by China Postdoctoral Science Foundation
                Award ID: 2013M542560, 2015T81129
                Award Recipient :
                Funded by: A Project of Shandong Province Higher Educational Science and Technology Program
                Award ID: No.J16LN61
                Award Recipient :
                This work is supported by the National Natural Science Foundation of China (61672020, 61662069, 61472433, 61702309, and 61572153, to S. L., X.Y., A.L., D.Z., and Z.T), the Project funded by China Postdoctoral Science Foundation (2013M542560, 2015T81129 to S.L.), National Key Research and Development Plan (2017YFB0801804, 2017YFB0802204 to A.L.), and A Project of Shandong Province Higher Educational Science and Technology Program (No. J16LN61 to X.W.).
                Categories
                Research Article
                Computer and Information Sciences
                Cryptography
                Physical Sciences
                Mathematics
                Cryptography
                Computer and Information Sciences
                Computer Networks
                Physical Sciences
                Mathematics
                Algebra
                Algebraic Geometry
                Social Sciences
                Economics
                Finance
                Physical Sciences
                Mathematics
                Algebra
                Polynomials
                Physical Sciences
                Mathematics
                Applied Mathematics
                Algorithms
                Research and Analysis Methods
                Simulation and Modeling
                Algorithms
                Social Sciences
                Economics
                Health Economics
                Medicine and Health Sciences
                Health Care
                Health Economics
                Computer and Information Sciences
                Data Acquisition
                Custom metadata
                All relevant data are within the paper and its Supporting Information files.

                Uncategorized
                Uncategorized

                Comments

                Comment on this article