4.7 Article

Secure Key Agreement and Key Protection for Mobile Device User Authentication

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2018.2850299

关键词

Authentication; two-party; mobile; anonymity

资金

  1. National Natural Science Foundation of China [61772377, 61572379, 61501333, 61572370]
  2. Natural Science Foundation of Hubei Province of China [2015CFA068, 2017CFA007]

向作者/读者索取更多资源

As mobile devices ownership becomes more prevalent (e.g., a user owns multiple mobile devices), the capability to offer secure and user friendly authentication becomes increasingly important. A large number of identity-based user authentication mechanisms for the wireless mobile environment have been proposed. However, they are not generally designed for situations where a user's private key and some other sensitive data can be exposed if his/her mobile device is remotely or physically controlled by an attacker. Threshold secret sharing is one of the solutions to this problem, but it is limited in the requirement that there should exist an honest third-party to hold the complete key after the secret reconstruction process. Therefore, in this paper, we consider the special case that only two devices (i.e., no honest party) at the user's side jointly perform user authentication with a server, and neither device can successfully complete the authentication process alone. Moreover, the key reconstruction is not needed during authentication so that neither device can hold a complete key. We then analyze the security of the proposed protocol and show that it satisfies all known security requirements in practical applications, particularly the key exposure attack resistance. The performance analysis of the proposed protocol is also presented to demonstrate its practicality.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method

Yinbin Miao, Wei Zheng, Xiaohua Jia, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng

Summary: This paper studies the problem of ranked keyword search over encrypted data in cloud computing. A Machine Learning-based Ranked Keyword Search (ML-RKS) scheme is proposed to reduce search complexity without sacrificing search accuracy, and an Enhanced ML-RKS (ML-RKS+) scheme is introduced to achieve forward security. The experiments on real-world dataset demonstrate the efficiency and feasibility of our schemes in practical applications.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Information Systems

Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems

Liping Zhang, Yue Zhu, Wei Ren, Yixin Zhang, Kim-Kwang Raymond Choo

Summary: E-health systems are important during the COVID-19 pandemic, but ensuring data security is challenging, especially when data comes from insecure devices. This study proposes a lightweight privacy-preserving three-factor authenticated key agreement scheme for resource-constrained e-health systems, with minimal computational cost.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Engineering, Electrical & Electronic

An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs

Xiaotong Zhou, Debiao He, Muhammad Khurram Khan, Wei Wu, Kim-Kwang Raymond Choo

Summary: Vehicular Ad-hoc Networks (VANETs) have potential applications in improving the efficiency and safety for intelligent transportation systems. The paper proposes an efficient blockchain-based CPPA (EBCPPA) scheme to address the limitations of existing schemes. Security and performance analyses show that EBCPPA is more efficient than other state-of-the-art solutions in terms of signing, verification, and bandwidth requirement.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Information Systems

Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks

Qing Fan, Debiao He, Jianhua Chen, Cong Peng, Lianhai Wang

Summary: Driven by cloud computing technologies, public-key encryption with keyword search (PEKS) is becoming popular in various fields. However, there are security and privacy issues in the encrypted data search and access processes. This article presents a postquantum searchable encryption scheme named Isoga, which fights against keyword guessing attacks. The scheme utilizes designated tester primitive and quantum resistance of isogeny.

IEEE SYSTEMS JOURNAL (2023)

Article Computer Science, Information Systems

A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things

Xiaohan Hao, Wei Ren, Yangyang Fei, Tianqing Zhu, Kim-Kwang Raymond Choo

Summary: The increase in volume, variety, and value of data generated by IoT devices highlights the need for secure and efficient access control solutions. Existing solutions are not lightweight or scalable for resource-constrained IoT devices. To address this, we propose a lightweight consortium blockchain-based architecture that utilizes intelligent access control for IoT devices. Our system ensures reliability, availability, confidentiality, integrity, security, and scalability, while also supporting data sharing among users and exceptional blockchain situations. Performance analysis indicates that typical cryptographic algorithms can run in the microsecond range.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Telecommunications

BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs

Biwen Chen, Zhongming Wang, Tao Xiang, Jiyun Yang, Debiao He, Kim-Kwang Raymond Choo

Summary: Vehicular Ad-Hoc Networks (VANETs) have improved driving safety and comfort through vehicular wireless communication technology. However, existing authentication protocols in VANETs have limitations in terms of privacy protection, malicious entity tracking, and cross-domain authentication. To address these challenges, we propose a secure and effective group signature scheme for anonymous authentication and traceable identity within a domain, and a blockchain-based privacy-preserving cross-domain authentication protocol (BCGS) that integrates both blockchain and group signature. Our evaluations show that BCGS outperforms other approaches in terms of security, computation, and storage costs.

VEHICULAR COMMUNICATIONS (2023)

Article Business

Assessment of the Blockchain Technology Adoption for the Management of the Electronic Health Record Systems

Saeed Alzahrani, Tugrul Daim, Kim-Kwang Raymond Choo

Summary: This article develops a scoring model to evaluate healthcare organization's readiness for blockchain adoption and validates the model through case studies.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2023)

Article Engineering, Civil

Efficient Resource Management of Micro-Services in VANETs

Mohammad Bany Taha, Saed Alrabaee, Kim-Kwang Raymond Choo

Summary: This paper proposes a scheme using CP-ABE to achieve data confidentiality in VANETs by building a cluster of vehicles to handle distributed micro-tasks. Tasks are distributed based on factors such as distance, duration, and resource availability. The effectiveness of the scheme is demonstrated through comparison with Kubernetes mechanism and simulation evaluations.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Theory & Methods

Collaborative Intrusion Detection System for SDVN: A Fairness Federated Deep Learning Approach

Jie Cui, Hu Sun, Hong Zhong, Jing Zhang, Lu Wei, Irina Bolodurina, Debiao He

Summary: With the development of communication technology and intelligent transportation systems, vehicular ad hoc networks (VANETs) have gained popularity, leading to increased importance of VANET communication security. An intrusion detection system (IDS) is essential in improving network security, but faces challenges in accuracy, efficiency, and completeness due to frequent location changes in VANETs. This study proposes a collaborative intrusion detection system (CIDS) model that utilizes federated learning in software-defined VANETs to address these issues. The model trains through collaboration among local software-defined networks (SDNs) without sharing local network data flows, improving IDS scalability and globality.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2023)

Article Computer Science, Information Systems

User-Friendly Public-Key Authenticated Encryption With Keyword Search for Industrial Internet of Things

Lang Pu, Chao Lin, Biwen Chen, Debiao He

Summary: The Industrial Internet of Things (IIoT) utilizes physical devices to collect data, which needs to be saved on a cloud server for processing and analysis. Traditional encryption techniques make it difficult to search the generated ciphertext. Public-key encryption with keyword search (PEKS) can provide data encryption and confidential searching, but it is susceptible to internal keyword guessing attacks (IKGAs) due to limited commonly used keywords. A user-friendly public-key authenticated encryption with keyword search (PAEKS) scheme is proposed in this article to address this issue.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Theory & Methods

Generative Steganography via Auto-Generation of Semantic Object Contours

Zhili Zhou, Xiaohua Dong, Ruohan Meng, Meimin Wang, Hongyang Yan, Keping Yu, Kim-Kwang Raymond Choo

Summary: As a promising technique of resisting steganalysis detection, generative steganography generates a new image with secret information as the stego-image. However, the conventional methods of generating stego-images result in limited information extraction accuracy and low security. To address these limitations, we propose a generative steganographic framework that encodes secret messages as disentangled object contours in a distribution-preserving manner.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Theory & Methods

BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records

Biwen Chen, Tao Xiang, Debiao He, Hongwei Li, Kim-Kwang Raymond Choo

Summary: In this paper, we propose BPVSE, a new verifiable and dynamic searchable encryption scheme for cloud-assisted EHR. BPVSE leverages blockchain and hash-proof chain to enable public verification of search results without a trusted authority. It supports dynamic datasets with forward and backward security, using a newly designed hidden data structure. Additionally, BPVSE allows for efficient encryption and parallel search.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Engineering, Environmental

Remarkable adsorption capacity of Cu2+-doped ZnAl layered double hydroxides and the calcined materials toward phosphate

Ding Ling Gao, Wei Wei Lin, Qiao Jing Lin, Fei Fei Dai, Yan Xue Xue, Jian Hua Chen, Yu Xiang Liu, Yang Huang, Qian Yang

Summary: In this study, Cu2+ was doped into ZnAl hydrotalcite to enhance its phosphate adsorption capacity. The Cu2+ doping increased the inter-layer spacing and specific surface area of the adsorbent. The optimal doping amount was found to be 1% of the total metal molarity. The resulting ZnAlCu layered trimetallic oxide exhibited significantly improved phosphate adsorption performance compared to ZnAl hydrotalcite and ZnAlCu ternary hydrotalcite.

JOURNAL OF ENVIRONMENTAL CHEMICAL ENGINEERING (2023)

Article Computer Science, Theory & Methods

PERCE: A Permissioned Redactable Credentials Scheme for a Period of Membership

Yang Liu, Debiao He, Qi Feng, Min Luo, Kim-Kwang Raymond Choo

Summary: The anonymous credential has various applications, such as pay-as-you-go strategy in electronic subscription. However, the strategy may not suit non-regular users as they require stricter identity supervision. Identity supervision is a crucial part of an anonymous credential system and needs to be both reasonable and practical in regulating user behavior. The combination of customized k-times and epochs is necessary due to the limitations of existing works. This paper presents a permissioned redactable credentials scheme that allows fine-grained supervision, user control, and user redaction, providing potential utility when evaluated for performance.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Information Systems

Exploring Dynamic Task Loading in SGX-Based Distributed Computing

Pengfei Wu, Jianting Ning, Wu Luo, Xinyi Huang, Debiao He

Summary: This article introduces a T-SGX framework based on trusted execution environments, which aims to protect user privacy and ensure system efficiency by dynamically loading enclave objects. All these objects are secretly shared and stored in a verifiably distributed share management system to mitigate exposure of sensitive information. Security analysis shows that T-SGX achieves secure distributed computing without privacy leakage to unauthorized parties. Experimental results demonstrate that T-SGX outperforms a state-of-the-art solution, with 11.9%-29.7% less overhead in SGX-based applications.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

暂无数据