A Higher Performance Data Backup Scheme Based on Multi-Factor Authentication †
Abstract
:1. Introduction
- We propose a data backup scheme which fixes two encryption keys and shared between the laptop and the server, and the smart card and the server, respectively, during the registration phase. In this way, we can reduce ten hash computations and one round communication in the authentication phase, which improves the execution efficiency of our scheme. We recall that, in Yi et al.’s scheme, there are two communication rounds between the laptop/smart card and the server. This means that we have reduced the number of communication rounds by 50%.
- In addition, our scheme also enjoys other benefits, such as reducing two hash computations and four hash computations during the registration phase and the updating phase, respectively.
- We give the security analysis and performance evaluation of our new data backup scheme, which shows that our new scheme enjoys the same security of previous papers and has a higher execution efficiency.
1.1. Related Work
1.1.1. Key Management
- Dynamic and Static Key Management
- Centralized and Distributed Key Management
- Symmetric and Asymmetric Key Management
1.1.2. Secure Multi-Party Computation
1.1.3. Multi-Factor Authentication
- Knowledge factors: what the user knows (such as passwords or PINs);
- Ownership factors: things owned by the user (such as tokens, smart cards, or smartphones);
- Biometric factors: the user’s biometrics (such as fingerprints or iris).
2. Preliminaries
2.1. Shamir’s (t-n) Threshold Secret Sharing Scheme
- PreparationLet be a finite field (p is a large odd prime number and ; n is the number of participants), is the shared secret, and at least out of the n participants are required to reconstruct s.
- Secret sharingFirstly, the secret dealer independently selects elements , and then constructs a polynomial of degree as follows:Then, the dealer randomly selects n different non-zero elements , and computes for . The share is given to the corresponding participant .
- Secret reconstructionWe assume that the combiner receives t shares ; the polynomial can be reconstructed by
2.2. Fuzzy Extractor
- 1.
- Reflexivity: = 0 if and only if ;
- 2.
- Symmetry: ;
- 3.
- Triangle inequality: .
- . It takes biometrics as input, and outputs an extracted random string and an auxiliary string P.
- . The reproduction algorithm takes P and as inputs, and outputs an extracted string R.
- Correctness: If , then, for all , it holds that .
- Security: Let W be a distribution on , if , then, for all PPT adversaries ,
2.3. Message Authentication Code
- : it takes a security parameter as input and outputs a key .
- : it takes a key k and a message as inputs, and outputs a tag t.
- : it takes a key k, a message m, and a tag t as inputs, and outputs a bit b; means valid and means invalid.
- A random key is chosen.
- The adversary is given oracle access to and outputs a pair . Formally, . Let Q denote the queries asked by during the execution.
- The output of the experiment is defined to be 1 if and only if and .
2.4. Model of Our Scheme
2.5. Adversary Capabilities
- Capabilities of the adversary
- :
- The adversary can eavesdrop, modify, intercept, or redirect the information transferred on open channels.
- :
- When the adversary obtains a smart card or a laptop, the adversary can extract the information in it.
- :
- The adversary can modify the information on the smart card and the laptop.
- :
- The adversary can achieve at most two of the following conditions: (1) obtain the smart card; (2) obtain the laptop; (3) obtain the password; (4) obtain the biometrics; or (5) corrupt the server.
2.6. Security Goals
- Security goals
- :
- Even if the adversary has the above capabilities, the adversary cannot reconstruct the private key k.
- :
- When the adversary tampers with the smart card or the laptop, the user can quickly detect this attack.
- :
- When a malicious server sends a wrong message to the user, the user can quickly detect it.
3. Efficiency Analysis of Yi et al.’s Scheme
- :
- The time complexity of the hash function operation.
- :
- The time complexity of the symmetric key encryption/decryption operation.
- :
- The time complexity of the polynomial interpolation operation.
- :
- The time complexity of the message authentication code tag generation algorithm.
- :
- The time complexity of the message authentication code verification algorithm.
- :
- The time complexity of the fuzzy extractor generation algorithm.
- :
- The time complexity of the fuzzy extractor recovery algorithm.
- :
- The time complexity of generating three shares using Shamir’s secret sharing.
4. Proposed Scheme
4.1. Registration Phase
Game 1 Registration phase | ||||
Smart card | Laptop (user) | Server | ||
choose | ||||
compute | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
choose | ||||
compute | ||||
store | ||||
and | ||||
store | ||||
and | ||||
store | ||||
and |
- The user chooses , a random number , and a first-degree polynomial , where k is the key to encrypt sensitive information, and r is a random number. The user chooses a symmetric encryption key for encrypted communication between the laptop and the server. The user chooses a symmetric encryption key for encrypted communication between the smart card and the server (e.g.,the user can choose and by using the key generation algorithm in AES).
- The user computes , and divides R into two parts which are, respectively, applied to the three pseudoshares and the message authentication code. The user computes three true shares , , and , three pseudoshares , , and , the authentication message , , and three tags , , and .
- The user sends the message to the server.
- After the server receives the message , the server chooses a random number X and generates , . Finally, the server stores values .
- The server sends the message Z to the user.
- The user stores values in the laptop.
- The user then sends to the smart card.
- The smart card stores .
4.2. Authentication Phase
4.2.1. Laptop and Smart Card
Game 2 Authentication phase: possession of the laptop and the smart card | ||
Smart card | Laptop (user) | |
compute | ||
if , stop; | ||
compute | ||
if , stop; | ||
else compute | ||
check | ||
if , stop; | ||
compute | ||
- The user inserts the smart card into the card reader, and the card reader reads the information ) in the smart card.
- The user inputs , and computes , then divides into two parts and . Then, the laptop verifies whether is a valid tag for message (). If , the laptop stops; otherwise, the laptop sends message to the smart card.
- After receiving the message, the smart card verifies whether is a valid tag for message (). If , the smart card stops.
- The smart card computes , then checks if is equal to V.
- If , the procedure aborts; otherwise, the smart card sends to the laptop.
- After receiving , the user computes , and .
4.2.2. Laptop and Server
Game 3 Authentication phase: laptop and server | ||
Laptop (user) | Server | |
input | ||
compute | ||
check | ||
if , stop; | ||
compute | ||
check | ||
if , stop; | ||
otherwise, server authenticates user; | ||
compute | ||
compute | ||
if , stop; | ||
else, compute | ||
- The user inputs , computes , and divides into two parts and . Then, the user inputs their , , and current timestamp . The laptop computes , and , .
- The laptop sends to the server.
- After receiving the request message , the server checks whether the current timestamp or not. If , the server stops; otherwise, the server uses the symmetric key to compute .
- . The server check whether is equal to Y. If , the server stops; otherwise, the server authenticates the user identity.
- The server computes and sends to the laptop.
- After receiving the message , the laptop computes and . If , the laptop stops; otherwise, the user computes .
4.2.3. Smart Card and Server
Game 4 Authentication phase: smart card and server | ||
Smart card (user) | Server | |
input | ||
compute | ||
check | ||
if , stop; | ||
compute | ||
check | ||
if , stop; | ||
otherwise, server authenticates user; | ||
compute | ||
compute | ||
if , stop; | ||
else, compute | ||
- The user inputs , computes , and divides into two parts and . Then, the user inputs their , , and current timestamp . The laptop computes and , .
- The laptop sends to the server.
- After receiving the request message , the server checks whether the current timestamp or not. If , the server stops; otherwise, the server uses the symmetric key to compute .
- . The server check whether is equal to Y. If , the server stops; otherwise, the server authenticates the user identity.
- The server computes and sends to the laptop.
- After receiving the message , the laptop computes and . If , the laptop stops; otherwise, the user computes .
4.3. Key Reconstruction Phase
4.4. Updating Phase
4.4.1. Updating Password
Game 5 Updating password | ||||
Smart card | Laptop (user) | Server | ||
compute | ||||
compute | ||||
check | ||||
if , stop; | ||||
choose | ||||
compute | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
store | ||||
store | ||||
compute | ||||
if , stop; | ||||
store | ||||
- The user inserts the smart card into the card reader, and the card reader reads the information in the smart card.
- The user obtains and the random number in the laptop, and inputs their biometrics and the old password . Then, the user computes and divides R into two parts and . After that, the laptop sends to the smart card.
- After receiving the message , the smart card computes and checks whether is equal to V. If , the smart card stops; otherwise, the smart card sends to the laptop.
- The user chooses a new random number and a new password and computes following values:, ,, ,, , ,, , .Then, the user stores in the laptop to replace and sends to the smart card.
- The smart card stores to replace .
- The laptop sends to the server.
- After receiving the message , the server calculates and checks if is equal to . If , the server replaces with ; otherwise, the server stops.
4.4.2. Updating Biometrics
- The user inserts the smart card into the card reader, and the card reader reads the information in the smart card.
- The user obtains and the random number in the laptop, and inputs their biometrics and the password . Then, the user computes and divides R into two parts and . After that, the laptop sends to the smart card.
- After receiving the message , the smart card computes and checks whether is equal to V. If , the smart card stops; otherwise, the smart card sends to the laptop.
- The user chooses a new random number and inputs new biometrics and computes following values:, ,,, , ,, , ,, , .Then, the user stores in the laptop to replace and sends to the smart card.
- The smart card stores to replace .
- The laptop sends to the server.
- After receiving the message , the server calculates and checks if is equal to . If , the server replaces with ; otherwise, the server stops.
Game 6 Updating biometrics | ||||
Smart card | Laptop (user) | Server | ||
compute | ||||
compute | ||||
check | ||||
if , stop; | ||||
choose | ||||
compute | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
store | ||||
store | ||||
compute | ||||
if , stop; | ||||
store | ||||
4.4.3. Rebuilding a New Smart Card
- The user chooses a new identity of smart card , a new random number , and a new first-degree polynomial , where is a random number and two new symmetric keys are and .
- The user computes three true shares , , and , three pseudoshares , , and , the authentication message , and , , .
- The laptop uses to replace and sends message to the server.
- After receiving the message , the server calculates and checks if is equal to . If , the server replaces with ; otherwise, the server stops.
- The laptop sends the message to the smart card.
- The user stores in the new smart card.
Game 7 Rebuilding a new smart card | ||||
New smart card | Laptop (user) | Server | ||
choose | ||||
f* (x)=r*x + k; | ||||
compute | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
store | ||||
compute | ||||
if , stop; | ||||
store | ||||
store | ||||
4.4.4. Rebuilding a New Laptop
- The user chooses a new random number , a new first-degree polynomial , where is a random number, and two new symmetric keys and .
- The user computes three true shares , , and , three pseudoshares , , and , the authentication message , and , , .
- The new laptop sends the message to the smart card.
- The smart card uses to replace and sends the message to the new laptop.
- After receiving the message , the new laptop stores and sends message to the server.
- After receiving the message , the server computes and checks whether is equal to . If , the server uses to replace ; otherwise, the server stops.
Game 8 Rebuilding a new laptop | ||||
Smart card | New laptop (user) | Server | ||
choose | ||||
f*(x)=r*x + k; | ||||
compute | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
, | ||||
store | ||||
store | ||||
compute | ||||
compute | ||||
if , stop; | ||||
store | ||||
5. Security Analysis and Performance Evaluation
5.1. Security Analysis
5.1.1. Resist Replay Attacks
- (1)
- After receiving the message, the server first needs to determine that is established.
- (2)
- When the laptop sends message to the server for the first time, we have . If the attacker continues to send the message to the server, the server will terminate the authentication process when the time does not satisfy equation .
5.1.2. Resist Impersonation User Attacks
5.1.3. Resist Impersonation Server Attacks
5.1.4. Resist Malicious Servers
5.1.5. Resist Offline Guessing Attacks
- (1)
- The adversary validates the value of V. In our scheme, V is stored in the smart card; thus, the adversary can only carry out offline guessing attacks in this way if he obtains the smart card. We recall that and is a random number stored in the laptop. It should be noted that the adversary cannot simultaneously obtain the smart card, the biometric information, and the laptop, which means the adversary cannot know both and at the same time. Therefore, if the adversary wants to perform offline password-guessing attacks, he must guess the value of or correctly. The security of the fuzzy extractor guarantees that is almost uniformly distributed since the biometrc information has enough entropy, and through the randomness of , the adversary cannot guess V correctly in polynomial time.
- (2)
- The adversary validates the value of Z. In our scheme, Z is stored in the smart card and the laptop, thus the adversary can only carry out offline guessing attacks in this way if he obtains the smart card or the laptop. We recall that . We consider the worst-case scenario, where the adversary obtains the laptop, which means that the adversary obtains both Z and . We note that the adversary cannot simultaneously obtain the smart card, obtain the laptop, and corrupt the server, which means that the adversary cannot know both and Y at the same time. Therefore, if the adversary wants to perform offline password-guessing attacks, he must guess the value of or Y correctly. The security of the fuzzy extractor and the randomness of Y guarantees that, the adversary cannot guess Z correctly in polynomial time.
5.2. Performance Evaluation
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Appendix A.1. Registration Phase
- The user chooses a robust fuzzy extractor , a message authentication code , and a hash function h. The user chooses , a random number , and a first-degree polynomial , where k is the key to encrypt sensitive information, and r is a random number.
- The user computes , and divides R into two parts and , which are, respectively, applied to the three pseudoshares and the message authentication code. The user computes three true shares and , the three pseudoshares , , and , the authentication message , , , and three tags , , and .
- The user sends a message to the server.
- After the server receives the message , the server chooses two random numbers and and generates and . Finally, the server stores values .
- The server sends the messages to the user.
- The user stores values in the laptop.
- The user then sends to the smart card.
- The smart card stores .
Appendix A.2. Authentication Phase
Appendix A.2.1. Possession of the Laptop and the Smart Card
- The user inserts the smart card into the card reader, and the card reader reads the information in the smart card.
- The user inputs , and computes , then divides into two parts and . The smart card verifies whether is a valid tag for message , . If , the smart card stops; otherwise, the laptop verifies whether is a valid tag for message , . If , the laptop stops; otherwise, it continues.
- The user inputs their and to the smart card, and the laptop sends to the smart card.
- The smart card computes , then checks if is equal to V.
- If , the procedure aborts; otherwise, the smart card sends to the laptop.
- After receiving , the user computes .
Appendix A.2.2. Losing the Smart Card
- The user inputs , computes and divides into two parts and . Then, the user inputs their . The laptop computes and , where is a random number chosen by the laptop, and is the current timestamp.
- The laptop sends to the server.
- After receiving the request message , the server checks whether the current timestamp or not. If , the server stops; otherwise, the server computes and checks whether is equal to or not. If they are not equal, the server stops; otherwise, the server authenticates the user. Then, the server chooses a random number , and computes , where is the current timestamp.
- The server sends message to the laptop.
- After receiving the response message , the laptop checks whether the current timestamp or not. If , the laptop stops; otherwise, the laptop computes and checks whether is equal to . If they are equal, the user authenticates the server; otherwise, the laptop stops.
- The laptop computes and sends to the server.
- After receiving the message , the server checks whether is equal to CM1 or not. If they are equal, it sets the session key . The server computes and sends to the laptop.
- After receiving the message , the user computes . The user computes . If , the user stops; otherwise, the user computes .
Appendix A.2.3. Losing the Laptop
Appendix A.3. Key Reconstruction Phase
Appendix A.4. Updating Phase
Appendix A.4.1. Updating Password
- The user inserts the smart card into the card reader, and the card reader reads the information in the smart card.
- The user inputs biometrics , the old password , and obtains the old random number , in the laptop and the in the smart card.
- The user computes , and divides R into two parts and . The user checks if is equal to V. If they are equal, the user continues; otherwise, the user stops.
- The user chooses a new random number and a new password and computes following values:Then the user stores in the laptop to replace and stores in the smart card to replace .
Appendix A.4.2. Updating Biometrics
Appendix A.4.3. Rebuilding a New Smart Card
- The user chooses a new identity of the smart card , a new random number , and a new first-degree polynomial , where is a random number.
- The user computes three true shares and , three pseudoshares and , the authentication message , and and .
- The laptop uses to replace and sends message to the server.
- After receiving the message , the server computes and checks if is equal to . If , the server uses to replace . Otherwise, the server stops.
- The user stores in the smart card.
Appendix A.4.4. Rebuilding a New Laptop
References
- Wei, L.; Zhu, H.; Cao, Z.; Dong, X.; Jia, W.; Chen, Y.; Vasilakos, A.V. Security and privacy for storage and computation in cloud computing. Inf. Sci. 2014, 258, 371–386. [Google Scholar] [CrossRef]
- Zhou, J.; Cao, Z.; Dong, X.; Vasilakos, A.V. Security and Privacy for Cloud-Based IoT: Challenges. IEEE Commun. Mag. 2017, 55, 26–33. [Google Scholar] [CrossRef]
- Katz, J.; Lindell, Y. Introduction to Modern Cryptography; Chapman and Hall/CRC: Boca Raton, FL, USA, 2007. [Google Scholar] [CrossRef]
- Chang, C.C.; Chou, Y.C.; Sun, C.Y. Novel and practical scheme based on secret sharing for laptop data protection. IET Inf. Secur. 2015, 9, 100–107. [Google Scholar] [CrossRef]
- Liu, Y.; Zhong, Q.; Chang, L.; Xia, Z.; He, D.; Cheng, C. A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 2017, 11, 250–255. [Google Scholar] [CrossRef]
- Hu, H.; Lin, C.; Chang, C.C.; Chen, L. Enhanced secure data backup scheme using multi-factor authentication. IET Inf. Secur. 2019, 13, 649–658. [Google Scholar] [CrossRef]
- Yi, J.; Wen, Y. An Improved Data Backup Scheme Based on Multi-Factor Authentication. In Proceedings of the 9th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, USA, 6–8 May 2023. [Google Scholar] [CrossRef]
- Shengwei, X.; Chunrui, G.; Xinyu, L. IBC improved key managerment scheme based on multi-party co-management. Comput. Appl. Softw. 2020, 37, 314–317. [Google Scholar]
- Xu, Z.; Jiang, H. A Framework of Decentralized PKI Key Management Based on Dynamic Trust. In Proceedings of the Security and Management, 2008; pp. 258–264. Available online: https://www.researchgate.net/profile/Hai-Jiang-7/publication/221199867_A_Framework_of_Decentralized_PKI_Key_Management_Based_on_Dynamic_Trust/links/56d8615108aee1aa5f7e6ffd/A-Framework-of-Decentralized-PKI-Key-Management-Based-on-Dynamic-Trust.pdf (accessed on 12 June 2024).
- Zheng, X.; Wang, H.; Chen, Y.; Liu, H.; Liu, R. A decentralized key management scheme via neighborhood prediction in mobile wireless networks. In Proceedings of the 7th IEEE International Conference on Mobile ad Hoc and Sensor Systems (IEEE MASS 2010), San Francisco, CA, USA, 8–12 November 2010; pp. 51–60. [Google Scholar]
- Yang, H.; Zhang, Y.; Zhou, Y.; Fu, X.; Liu, H.; Vasilakos, A.V. Provably secure three-party authenticated key agreement protocol using smart cards. Comput. Netw. 2014, 58, 29–38. [Google Scholar] [CrossRef]
- Park, S.; Park, H.J. Privacy preserving three-party authenticated key agreement protocol using smart cards. Int. J. Secur. Its Appl. 2014, 8, 307–320. [Google Scholar] [CrossRef]
- Jiang, Q.; Zeadally, S.; Ma, J.; He, D. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 2017, 5, 3376–3392. [Google Scholar] [CrossRef]
- Yao, A.C. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982), Chicago, IL, USA, 3–5 November 1982; pp. 160–164. [Google Scholar]
- Goldreich, O.; Micali, S.; Wigderson, A. How to play any mental game, or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali; ACM Digital Library: New York, NY, USA, 2019; pp. 307–328. [Google Scholar]
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Blakley, G.R. Safeguarding cryptographic keys. In Proceedings of the International Workshop on Managing Requirements Knowledge, New York, NY, USA, 4–7 June 1979; IEEE Computer Society: Washington, DC, USA, 1979; pp. 313–318. [Google Scholar]
- Ben-Or, M.; Goldwasser, S.; Wigderson, A. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Providing Sound Foundations For Cryptography: On the Work of Shafi Goldwasser and Silvio Micali; ACM Digital Library: New York, NY, USA, 2019; pp. 351–371. [Google Scholar]
- Rabin, T.; Ben-Or, M. Verifiable secret sharing and multiparty protocols with honest majority. In Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, Seattle, WA, USA, 14–17 May 1989; pp. 73–85. [Google Scholar]
- Jiang, Q.; Wei, F.; Fu, S.; Ma, J.; Li, G.; Alelaiwi, A. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 2015, 83, 2085–2101. [Google Scholar] [CrossRef]
- Lamport, L. Password authentication with insecure communication. Commun. ACM 1981, 24, 770–772. [Google Scholar] [CrossRef]
- Nam, J.; Choo, K.K.; Han, S.; Paik, J.; Won, D. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting. Symmetry 2015, 7, 105–124. [Google Scholar] [CrossRef]
- Juang, W.S.; Chen, S.T.; Liaw, H.T. Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards. IEEE Trans. Ind. Electron. 2008, 55, 2551–2556. [Google Scholar] [CrossRef]
- Sood, S.K.; Sarje, A.K.; Singh, K. An improvement of Xu et al.’s authentication scheme using smart cards. In Proceedings of the Third Annual ACM Bangalore Conference, Bangalore, India, 22–23 January 2010. [Google Scholar] [CrossRef]
- Chen, C.M.; Ku, W.C. Stolen-Verifier Attack on Two New Strong-Password Authentication Protocols (Regular Section). IEICE Trans. Commun. 2002, 85, 2519–2521. [Google Scholar]
- Harn, L.; Huang, D.; Laih, C.S. Password authentication based on public-key distribution cryptosystem. In Proceedings of the Fifth International Conference on Data Engineering, Los Angeles, CA, USA, 6–10 February 1989. [Google Scholar] [CrossRef]
- Diffie, W.; Hellman, M. New Directions in Cryptography (1976). In Ideas That Created the Future; The MIT Press: Cambridge, MA, USA, 2021; pp. 421–440. [Google Scholar] [CrossRef]
- Chang, C.C.; Wu, T.C. Remote password authentication with smart cards. IEE Proc. Comput. Digit. Tech. 1991, 138, 165. [Google Scholar] [CrossRef]
- Chang, C.C.; Laih, C. Comment on remote password authentication with smart cards. IEE Proc.-E 1992, 139, 372. [Google Scholar]
- Tan, K.; Zhu, H. Remote password authentication scheme based on cross-product. Comput. Commun. 1999, 22, 390–393. [Google Scholar] [CrossRef]
- Hwang, M.S.; Li, L.H. A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 2000, 46, 28–30. [Google Scholar] [CrossRef]
- Yang, G.; Wong, D.S.; Wang, H.; Deng, X. Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 2008, 74, 1160–1172. [Google Scholar] [CrossRef]
- Hsieh, W.B.; Leu, J.S. Exploiting hash functions to intensify the remote user authentication scheme. Comput. Secur. 2012, 31, 791–798. [Google Scholar] [CrossRef]
- Lee, J.; Ryu, S.; Yoo, K. Fingerprint-based remote user authentication scheme using smart cards. Electron. Lett. 2002, 38, 1. [Google Scholar] [CrossRef]
- Li, C.T.; Hwang, M.S. An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 2010, 33, 1–5. [Google Scholar] [CrossRef]
- Das, A.K. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 2011, 5, 145–151. [Google Scholar] [CrossRef]
- Om, H.; Reddy, M.R. Geometric based remote password authentication using biometrics. J. Discret. Math. Sci. Cryptogr. 2013, 16, 207–220. [Google Scholar] [CrossRef]
- Dodis, Y.; Reyzin, L.; Extractors, A.S.F. How to generate strong keys from biometrics and other noisy, data April 13. In Proceedings of the Eurocrypt, Interlaken, Switzerland, 2–6 May 2004. [Google Scholar]
- Odyuo, N.; Lodh, S.; Walling, S. Multifactor Mutual Authentication of IoT Devices and Server. In Proceedings of the 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 23–25 January 2023. [Google Scholar] [CrossRef]
- Braeken, A. Highly Efficient Bidirectional Multifactor Authentication and Key Agreement for Real-Time Access to Sensor Data. IEEE Internet Things J. 2023, 10, 21089–21099. [Google Scholar] [CrossRef]
- Mostafa, A.M.; Ezz, M.; Elbashir, M.K.; Alruily, M.; Hamouda, E.; Alsarhani, M.; Said, W. Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication. Appl. Sci. 2023, 13, 10871. [Google Scholar] [CrossRef]
- Maes, J.G.; Rahman, K.A.; Mukherjee, A. Hybrid Smartwatch Multi-factor Authentication. In Proceedings of the 2023 IEEE 17th International Symposium on Medical Information and Communication Technology (ISMICT), Lincoln, NE, USA, 10–12 May 2023. [Google Scholar] [CrossRef]
- Kumar, R.; Singh, S.; Singh, P.K. A secure and efficient computation based multifactor authentication scheme for Intelligent IoT-enabled WSNs. Comput. Electr. Eng. 2023, 105, 108495. [Google Scholar] [CrossRef]
- Li, X.; Peng, J.; Obaidat, M.S.; Wu, F.; Khan, M.K.; Chen, C. A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems. IEEE Syst. J. 2020, 14, 39–50. [Google Scholar] [CrossRef]
- Tan, Z. A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 2013, 72, 311–320. [Google Scholar] [CrossRef]
- Maliberan, E.V.; Sison, A.M.; Medina, R.P. A new approach in expanding the hash size of MD5. Int. J. Commun. Netw. Inf. Secur. 2018, 10, 374–379. [Google Scholar] [CrossRef]
- Wang, F.; Xu, G.; Xu, G.; Wang, Y.; Peng, J. A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Wirel. Commun. Mob. Comput. 2020, 2020, 3805058. [Google Scholar] [CrossRef]
Abbreviation | Meaning |
---|---|
Identity of the user | |
Identity of the smart card | |
Identity of the server | |
Password of the user | |
Biometrics of the user | |
Session key | |
A random number selected by the user | |
Random number generated by the server | |
Time stamp | |
Time interval | |
⊕ | Exclusive-or operation |
A new message # | |
‖ | Concatenation operator |
Collision-resistant hash function | |
Adversary | |
Symmetric encryption / decryption algorithm | |
The set of natural real numbers |
Phase | Entity | ||||||||
---|---|---|---|---|---|---|---|---|---|
Registration | Laptop | 3 | 0 | 0 | 3 | 0 | 1 | 0 | 1 |
Smart card | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Authentication (Case 1) | Laptop | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 |
Smart card | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | |
Server | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Authentication (Case 2) | Laptop | 6 | 1 | 0 | 0 | 1 | 0 | 1 | 0 |
Smart card | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 6 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | |
Authentication (Case 3) | Laptop | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Smart card | 6 | 1 | 0 | 0 | 1 | 0 | 1 | 0 | |
Server | 6 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | |
Rebuilding smart card | Laptop | 1 | 1 | 0 | 3 | 0 | 0 | 0 | 1 |
Smart card | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | |
Rebuilding laptop | Laptop | 1 | 1 | 0 | 3 | 0 | 0 | 0 | 1 |
Smart card | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | |
Updating biometrics | Laptop | 5 | 1 | 0 | 3 | 0 | 1 | 1 | 0 |
Smart card | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | |
Updating password | Laptop | 5 | 1 | 0 | 3 | 0 | 0 | 1 | 0 |
Smart card | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | |
Reconstruction | Laptop | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
Smart card | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Phase | Entity | ||||||||
---|---|---|---|---|---|---|---|---|---|
Registration | Laptop | 2 | 0 | 0 | 3 | 0 | 1 | 0 | 1 |
Smart card | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Authentication (Case 1) | Laptop | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 |
Smart card | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | |
Server | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Authentication (Case 2) | Laptop | 1 | 2 | 0 | 0 | 1 | 0 | 1 | 0 |
Smart card | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 1 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | |
Authentication (Case 3) | Laptop | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Smart card | 1 | 2 | 0 | 0 | 1 | 0 | 1 | 0 | |
Server | 1 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | |
Rebuilding smart card | Laptop | 1 | 1 | 0 | 3 | 0 | 0 | 0 | 1 |
Smart card | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | |
Rebuilding laptop | Laptop | 1 | 1 | 0 | 3 | 0 | 0 | 0 | 1 |
Smart card | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | |
Updating biometrics | Laptop | 3 | 1 | 0 | 3 | 0 | 1 | 1 | 0 |
Smart card | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | |
Updating password | Laptop | 3 | 1 | 0 | 3 | 0 | 0 | 1 | 0 |
Smart card | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | |
Reconstruction | Laptop | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
Smart card | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
Server | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Scheme | Compution Cost | ||||||||
---|---|---|---|---|---|---|---|---|---|
Registration Phase | Authentication Phase | Updating Phase | |||||||
Laptop | Smart Card | Server | Laptop | Smart Card | Server | Laptop | Smart Card | Server | |
Yi et al.’s scheme [7] | 0 | ||||||||
Our scheme | 0 | ||||||||
Time cost reduction |
Scheme | Authentication Phase | Entity | Execution Time | Communication Cost | ||
---|---|---|---|---|---|---|
Laptop | Smart Card | Server | (ms) | (bits) | ||
Liu et al.’s [5] | Case1 | - | - | 9.18 | 128 | |
Case2 | - | 128.52 | 896 | |||
Case3 | 128.52 | 1024 | ||||
Hu et al.’s [6] | Case1 | - | - | 18.36 | 128 | |
Case2 | - | 137.70 | 1024 | |||
Case3 | 156.06 | 1024 | ||||
Yi et al.’s [7] | Case1 | - | 109.96 | 768 | ||
Case2 | - | 237.99 | 1152 | |||
Case3 | - | 237.99 | 1152 | |||
Ours | Case1 | - | 109.96 | 768 | ||
Case2 | - | 192.09 | 640 | |||
Case3 | - | 192.09 | 640 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wu, L.; Wen, Y.; Yi, J. A Higher Performance Data Backup Scheme Based on Multi-Factor Authentication. Entropy 2024, 26, 667. https://doi.org/10.3390/e26080667
Wu L, Wen Y, Yi J. A Higher Performance Data Backup Scheme Based on Multi-Factor Authentication. Entropy. 2024; 26(8):667. https://doi.org/10.3390/e26080667
Chicago/Turabian StyleWu, Lingfeng, Yunhua Wen, and Jinghai Yi. 2024. "A Higher Performance Data Backup Scheme Based on Multi-Factor Authentication" Entropy 26, no. 8: 667. https://doi.org/10.3390/e26080667
APA StyleWu, L., Wen, Y., & Yi, J. (2024). A Higher Performance Data Backup Scheme Based on Multi-Factor Authentication. Entropy, 26(8), 667. https://doi.org/10.3390/e26080667