2018
DOI: 10.5755/j01.itc.47.3.17361
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme

Abstract: Multi-server authentication makes convenient to benefit from services of various service providers on the basis of one-time registration through a trusted third party. Since, the users are reluctant to register themselves separately from all servers due to the hassle of remembering many passwords and other cost constraints. The multi-server authentication enables the immediate provision of services by the real-time verification of users on an insecure channel. The literature for multi-server oriented authentic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 34 publications
0
8
0
Order By: Relevance
“…The security traits and the scrutiny of defending to numerous attacks for different schemes are described in Table 2, in which the proposed protocol is signified as a strong corroborated key-agreement in contrast to former schemes. Table 2 presents the analysis of our schemes with related schemes [20][21][22][23]25]. As per the analysis, we can conclude that our protocol is more secure than [20][21][22][23]25].…”
Section: Performance Analysismentioning
confidence: 72%
See 3 more Smart Citations
“…The security traits and the scrutiny of defending to numerous attacks for different schemes are described in Table 2, in which the proposed protocol is signified as a strong corroborated key-agreement in contrast to former schemes. Table 2 presents the analysis of our schemes with related schemes [20][21][22][23]25]. As per the analysis, we can conclude that our protocol is more secure than [20][21][22][23]25].…”
Section: Performance Analysismentioning
confidence: 72%
“…Table 2 presents the analysis of our schemes with related schemes [20][21][22][23]25]. As per the analysis, we can conclude that our protocol is more secure than [20][21][22][23]25]. All these protocols depend upon hash-based symmetric cryptography and similar in nature.…”
Section: Performance Analysismentioning
confidence: 77%
See 2 more Smart Citations
“…After mutual authentication, both the communicating parties establish a session key which can be further used to secure communication among them for accessing the services from a remote server by a legal user. Starting from the seminal work designed by Lamport [12] in 1981, several remote user authentication mechanisms have been proposed in the literature [13]- [19]. However, the major of these schemes are inefficient for practical implementations or they are vulnerable to various potential attacks, such as privileged-insider attack, stolen smart card attack, replay and man-in-the-middle attacks, impersonation attacks, and so on.…”
Section: Introductionmentioning
confidence: 99%