2012
DOI: 10.1007/978-3-642-31137-6_30
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication with Key Agreement Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(42 citation statements)
references
References 21 publications
0
42
0
Order By: Relevance
“…In Table 2, we provided the computation cost comparison. It is noticeable that the proposed scheme takes less computation cost than the scheme in [27], but takes more cost than the schemes in [21,28,53]. Note that the schemes in [21,28,53] suffer from security weaknesses whereas the scheme in [27] is secure, thus, the proposed scheme is relatively efficient in terms of computation cost than others.…”
Section: Performance Evaluationmentioning
confidence: 81%
See 2 more Smart Citations
“…In Table 2, we provided the computation cost comparison. It is noticeable that the proposed scheme takes less computation cost than the scheme in [27], but takes more cost than the schemes in [21,28,53]. Note that the schemes in [21,28,53] suffer from security weaknesses whereas the scheme in [27] is secure, thus, the proposed scheme is relatively efficient in terms of computation cost than others.…”
Section: Performance Evaluationmentioning
confidence: 81%
“…As discussed in Section "TMIS architecture and discussion", the proposed scheme is related to multi-server environment, where the patient can exchange medical information with the doctor(s) via central medical server (CMS). For this reason, we measured and compared the performance of the schemes in [21,27,28,53] and the proposed scheme. It is worth to note that the security is the most important issue in cryptographic scheme i.e., the scheme should be free from security attacks with reasonable complexities cost such as computation and communication cost as well as smart card storage cost.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…In Section II-A, the upsides and downsides of these frameworks are clarified and the utilization of biometrics is proposed as an option. Biometrics have as of now been joined in remote confirmation (see [3], [4], [5]) however just as secret word substitution in shrewd cards. Keeping in mind the end goal to research their full probability, biometrics can be fused in cross breed cryptosteganographic plans.…”
Section: International Journal Of Advance Engineering and Research Dementioning
confidence: 99%
“…Recently, Li et al [34] found some security weaknesses of Das [31] and Lee et al [35], such as session-key agreement and key-impersonation attacks using biometric-based user authentication schemes. As a consequence, none of the existing authentication schemes [9][10][11][12][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42] fulfill the security properties of the AKA protocol and resist most of the potential attacks, such as password guessing, key impersonation, and so on, in the multimedia client-server environment. Most recently, Deebak et al [36] presented a secure key AKA protocol scheme to satisfy the promising feature of the 3GPP AKA protocol using IP multimedia server-client systems.…”
Section: Related Workmentioning
confidence: 99%