2022
DOI: 10.1007/s00607-021-01041-6
|View full text |Cite
|
Sign up to set email alerts
|

A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 65 publications
0
7
0
Order By: Relevance
“…An innovative, elliptic curve cryptography-based, privacy-preserving multi-factor authentication technique for CC was suggested by the authors of Ref. 25. As security and privacy authentication characteristics, this protocol offered user anonymity, unlinkability, perfect forward secrecy, and session key security.…”
Section: Related Workmentioning
confidence: 99%
“…An innovative, elliptic curve cryptography-based, privacy-preserving multi-factor authentication technique for CC was suggested by the authors of Ref. 25. As security and privacy authentication characteristics, this protocol offered user anonymity, unlinkability, perfect forward secrecy, and session key security.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, Chen and Chen [22] proposed a three-factor-based authentication for e-health cloud systems to overcome weaknesses of previously proposed protocols. Unfortunately, their protocol is still vulnerable to known session-specific temporary information attack and does not provide untraceability [23].…”
Section: Related Workmentioning
confidence: 99%
“…Hector and Atsuko [ 34 ] proposed the first consistent, tree-based, SIDH-based group exchange protocol with logarithmic-order connectivity and memory complex, of which the only key exchange group based on isogeny has linear order. Authors [ 35 ] identify that the protocol used in [ 36 ] is vulnerable to link ability of users, denial-of-service attacks, and replay attacks. Also, the protocol used by [ 37 ] is prone to link ability of user and temporary information attack based on session-specific.…”
Section: Related Workmentioning
confidence: 99%
“…Also, the protocol used by [ 37 ] is prone to link ability of user and temporary information attack based on session-specific. A system that handles these vulnerabilities is proposed in [ 35 ]. The protocol elliptic curve cryptography secures and provides preservation of privacy in multi-factor authentication protocol in the cloud environment, this mainly solves the limitations of the [ 36 , 37 ].…”
Section: Related Workmentioning
confidence: 99%