• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wan Tao, Liu Zunxiong, Ma Jianfeng. Authentication and Key Agreement Protocol for Multi-Server Architecture[J]. Journal of Computer Research and Development, 2016, 53(11): 2446-2453. DOI: 10.7544/issn1000-1239.2016.20150107
Citation: Wan Tao, Liu Zunxiong, Ma Jianfeng. Authentication and Key Agreement Protocol for Multi-Server Architecture[J]. Journal of Computer Research and Development, 2016, 53(11): 2446-2453. DOI: 10.7544/issn1000-1239.2016.20150107

Authentication and Key Agreement Protocol for Multi-Server Architecture

More Information
  • Published Date: October 31, 2016
  • With the rapid growth of Internet applications, the architecture of server providing resources to be accessed over the network often consists of many different servers. Authentication and key agreement protocol play an important role to authenticate remote users for multi-server architecture. In recent years, several authentication and key agreement protocols for multi-server architecture have been developed. Single registration is the most important feature in a multi-server architecture which may help users take desired services without repeating registration to each service provider. Employing a dynamic ID for each login may efficiently preserve privacy. Recently, Chuang et al. presented an anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. They claimed that their protocol not only supported multi-server environments but also achieved many security requirements. A cryptanalysis on Chuang et al.’s scheme shows that their scheme cannot provide the anonymity and is vulnerable to server masquerade attack and smart card loss attack. To overcome these security flaws, an improved protocol is proposed by choosing different secret parameters for each application server. This protocol can be proved to be secure against server masquerade attack, smart card loss attack, impersonation attack, eavesdropping attack, replay attack and so on. Besides, the improved protocol maintains the feature of simple operation.
  • Related Articles

    [1]LiFeng, PanJingkui. Human Motion Recognition Based on Triaxial Accelerometer[J]. Journal of Computer Research and Development, 2016, 53(3): 621-631. DOI: 10.7544/issn1000-1239.2016.20148159
    [2]Lü Zhiguo, Li Yan, Xu Xin. Research on Fast 3D Hand Motion Tracking System[J]. Journal of Computer Research and Development, 2012, 49(7): 1398-1407.
    [3]Liu Weibin, Liu Xingqi, Xing Weiwei, Yuan Baozong. Improving Motion Synthesis by Semantic Control[J]. Journal of Computer Research and Development, 2011, 48(7): 1255-1262.
    [4]Lu Jiyuan, Zhang Peizhao, Duan Xiaohua, Chao Hongyang. An Optimized Motion Estimation Algorithm Based on Macroblock Priorities[J]. Journal of Computer Research and Development, 2011, 48(3): 494-500.
    [5]Xia Shihong, Wei Yi, and Wang Zhaoqi. A Survey of Physics-Based Human Motion Simulation[J]. Journal of Computer Research and Development, 2010, 47(8): 1354-1361.
    [6]Zong Dan, Li Chunpeng, Xia Shihong, Wang Zhaoqi. Key-Postures Based Automated Construction of Motion Graph[J]. Journal of Computer Research and Development, 2010, 47(8): 1321-1328.
    [7]Zhang Zhixian, Liu Jianhua, and Ning Ruxin. Research on Motion Simulation Realization Technology of Planar Linkage Based on Virtual Environment[J]. Journal of Computer Research and Development, 2010, 47(6): 979-987.
    [8]Mao Tianlu, Xia Shihong, Zhu Xiaolong, and Wang Zhaoqi. Real-Time Garment Animation Based on Mixed Model[J]. Journal of Computer Research and Development, 2010, 47(1): 8-15.
    [9]Yang Yuedong, Wang Lili, and Hao Aimin. Motion String: A Motion Capture Data Representation for Behavior Segmentation[J]. Journal of Computer Research and Development, 2008, 45(3): 527-534.
    [10]Zhao Guoying, Li Zhenbo, Deng Yu, Li Hua. Human Motion Recognition and Simulation Based on Retrieval[J]. Journal of Computer Research and Development, 2006, 43(2): 368-373.

Catalog

    Article views (1332) PDF downloads (719) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return