Back to Search Start Over

A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing.

Authors :
Fushan Wei
Ruijie Zhang
Chuangui Ma
Source :
Fundamenta Informaticae. 2018, Vol. 157 Issue 1-2, p201-220. 20p.
Publication Year :
2018

Abstract

Two-factor authenticated key exchange (TFAKE) protocols are critical tools for ensuring identity authentication and secure data transmission for cloud computing. Until now, numerous TFAKE protocols based on smart cards and passwords are proposed under this circumstance. Unfortunately, most of them are found insecure against various attacks. Researchers focus on cryptanalysis of these protocols and then fixing the loopholes. Little attention has been paid to design rationales and formal security models of these protocols. In this paper, we summarize the security requirements and put forward a formal security model for TFAKE protocols for cloud computing. We then present an efficient TFAKE protocol without using expensive asymmetric cryptology mechanisms to achieve high efficiency. Our protocol can be proven secure in the random oracle model and achieves user anonymity. Compared with other TFAKE protocols, our protocol is more efficient and enjoys provable security. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
01692968
Volume :
157
Issue :
1-2
Database :
Academic Search Index
Journal :
Fundamenta Informaticae
Publication Type :
Academic Journal
Accession number :
127583068
Full Text :
https://doi.org/10.3233/FI-2018-1626