2020
DOI: 10.1007/s11042-020-09078-z
|View full text |Cite
|
Sign up to set email alerts
|

A secure and improved multi server authentication protocol using fuzzy commitment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 42 publications
0
3
0
Order By: Relevance
“…When there is a devastating failure in the computer room, these backups also stored in the computer room cannot play an effective backup role at all. Rehman et al [ 11 ] play an important role in protecting network information in a cloud computing environment in order to effectively improve the security and availability of data and realize the improvement and creation of storage system, so as to give priority to hot data access to corresponding levels, and improve reading and writing efficiency [ 11 ]. Dastres and Soori [ 12 ] believe that the connection and storage of traditional storage technologies are realized through the data interface with the host.…”
Section: Literature Reviewmentioning
confidence: 99%
“…When there is a devastating failure in the computer room, these backups also stored in the computer room cannot play an effective backup role at all. Rehman et al [ 11 ] play an important role in protecting network information in a cloud computing environment in order to effectively improve the security and availability of data and realize the improvement and creation of storage system, so as to give priority to hot data access to corresponding levels, and improve reading and writing efficiency [ 11 ]. Dastres and Soori [ 12 ] believe that the connection and storage of traditional storage technologies are realized through the data interface with the host.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Reference [30] proposed a new multi-server authentication protocol for using fuzzy commitment scheme. In [31], Rehman et al found that Barman et al's protocol [30] is still vulnerable to anonymity violation attack and impersonation based on stolen smart card attack. Reference [31] proposed an enhanced protocol to overcome the security weaknesses of Barman et al's scheme.…”
Section: B Fuzzy Commitmentmentioning
confidence: 99%
“…In the stolen verifier table attack, the adversary misuses valued data which are stored at servers' side such as passwords or other parameters and masquerade as legal users [35]. In our scheme, the blockchain maintains the repository that stores public keys, rather than servers or RC maintain the verifier table.…”
Section: No Stolen Verifier Table Attackmentioning
confidence: 99%