2018
DOI: 10.1155/2018/5432960
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service

Abstract: Secure and efficient authentication protocols are necessary for cloud service. Multifactor authentication protocols taking advantage of smart card, user’s password, and biometric, are more secure than password-based single-factor authentication protocols which are widely used in practice. However, most of the multiserver authentication protocols may have weak points, such as smart card loss attack, man-in-the-middle attack, anonymity, and high computation cost of authentication center. In order to overcome the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…This scheme is relatively good in terms of security and communication consumption, but the protocol has not been verified in a formal protocol analysis model. Ying et al 23 propose a fast anonymous mutual authentication protocol in 5G networks. The protocol verifies the validity of users and servers using elliptic curve‐based public key ciphers, while the protocol ensures privacy issues in a multi‐server network.…”
Section: Related Workmentioning
confidence: 99%
“…This scheme is relatively good in terms of security and communication consumption, but the protocol has not been verified in a formal protocol analysis model. Ying et al 23 propose a fast anonymous mutual authentication protocol in 5G networks. The protocol verifies the validity of users and servers using elliptic curve‐based public key ciphers, while the protocol ensures privacy issues in a multi‐server network.…”
Section: Related Workmentioning
confidence: 99%
“…. BAN logic is a set of rules for defining and analyzing authentication protocols, which is widely used in many works, such as the schemes in [5,6,30,31]. For convenience, all the notations used in the BAN logic are given in Table 2: Basic rules of BAN logic are given in Table 3.…”
Section: Formal Security Analysis Using Ban Logicmentioning
confidence: 99%