You are currently viewing a new version of our website. To view the old version click .
Mathematics
  • Article
  • Open Access

25 December 2023

Physical-Unclonable-Function-Based Lightweight Three-Factor Authentication for Multiserver Architectures

and
Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou 311121, China
*
Author to whom correspondence should be addressed.
This article belongs to the Section E1: Mathematics and Computer Science

Abstract

To support more complex and robust online services, enterprise-class applications prefer to interconnect multiple servers as the pedestal to enhance the system’s interoperability. However, the multiserver architecture always struggles to reconcile the trade-off between convenience and security, leaving users exposed to a variety of network attack threats. Existing security authentication schemes based on the Chebyshev Chaotic Map for multiserver architectures cannot provide three-factor (including password, biometric feature, and smart card) security. Therefore, we propose a novel Physical-Unclonable-Function-based Lightweight Three-Factor Authentication (PUF-LTA) scheme, which can achieve three-factor security. The PUF-LTA scheme mainly includes two components: (1) PUF-assisted registration and (2) lightweight mutual authentication with one-time interaction. During the PUF-assisted registration process, to defend against side-channel attacks on smart cards, the login credentials of users are XORed with the unique identifier generated by the PUF so that the adversary cannot obtain these secret login credentials. During the lightweight mutual authentication process, we combine the Chebyshev polynomial map and symmetric encryption/decryption to negotiate the session key between users and servers, which only needs one interaction. The security performance of PUF-LTA is theoretically proved by leveraging the random oracle model. In contrast with relevant multiserver authentication schemes, PUF-LTA is more efficient and suitable for resource-constrained multiserver environments because it can ensure secure three-factor authentication and support flexible biometrics and password updates with less computation cost.

1. Introduction

With significant developments in cloud/edge computing and Internet of Things (IoT), intelligent terminals have become an integral part of human society [,,]. Intelligent terminals often serve as a basic interaction tool among users, experts, and institutions, constantly supporting various remote-access services (e.g., online payment, e-health, and e-commerce) and scanning data (e.g., transactional data, medical diagnosis data, and military data).
As the number of intelligent terminals increases rapidly, it is difficult for conventional single server architecture to respond to high concurrent requests from large-scale terminals in real time due to limited computation, communication, and storage resources. This is because these participants communicate mostly over a public channel, such as wireless communication, and information transmitted over public channels is vulnerable to many cyberattacks (e.g., eavesdropping, replay, interception, modification, and impersonation attacks) [,,].
The single-server authentication scheme is not feasible and burdensome when applied in a multiserver scenario. On one hand, it is very inconvenient for users to register on each server because remembering all usernames and passwords on different servers is very hard. On the other hand, users will suffer from password leakage if they register the same password on different servers. Moreover, existing schemes for the multiserver architecture often adopt modular exponentiation operations or elliptic curve scalar multiplication, which leads to high computation overhead [,,,].
Hence, designing a robust and lightweight multiserver mutual authentication scheme is crucial for high-level security requirements. Chebyshev’s chaotic map is considered a promising approach to tackle the aforementioned issues because of its efficient computation. To improve authentication efficiency, Chatterjee et al. [] designed an authentication scheme that integrates Chebyshev’s chaotic map, symmetric encryption/decryption, and a one-way hash function to provide a three-factor authentication protocol for multiserver environments. However, according to the analysis by Yu et al. [], their integrated scheme still could not resist user impersonation attacks, and it also could not provide enough guarantee for user untraceability. Above all, their scheme did not achieve three-factor security as they claimed. Based on this, an extended authentication scheme was designated by Yu et al., and this scheme was claimed to have the ability to defend against all known security attacks and achieve three-factor security in multiserver environments. Unfortunately, because of design flaws, server impersonation attacks, user impersonation attacks, and man-in-the-middle attacks still can be committed successfully in their scheme. Meanwhile, during the authentication process, user untraceability was not achieved for the scheme-linked personally identifiable information in the user authentication request. It is noteworthy that their scheme still did not achieve three-factor security because biometric information could be obtained by any other legitimate user.
Generally, there are three components in a multiserver authentication architecture, including a registration center (RC), users, and servers. In the authentication process, RC publishes system parameters and offers registration services. Subsequently, users and servers conduct mutual authentication, which means the client verifies the authenticity of the server’s identity, and the server also needs to verify the authenticity of the client’s identity. Ultimately, users can securely access services from the server upon successful mutual authentication. To reduce the computation complexity and improve the security of multiserver authentication, a novel Physical-Unclonable-Function-empowered Lightweight Three-factor Authentication (PUF-LTA) scheme is designed in this paper that requires only one registration for users to access all servers. It ensures true three-factor security, simplifying the user experience and reducing the overall administrative burden.
The main contributions of this paper are listed as follows:
(1)
We analyze the three-factor multiserver authentication scheme proposed by Yu et al. [], and the result shows that their scheme cannot resist man-in-the-middle attacks or user/server impersonation attacks. Furthermore, their scheme also cannot guarantee untraceability or three-factor security.
(2)
A novel Physical-Unclonable-Function-based Lightweight Three-factor Authentication (PUF-LTA) scheme is proposed for multiserver environments. In our scheme, the login credentials of users and servers are protected by the PUF, supporting three-factor security. Additionally, during the mutual authentication phase of PUF-LTA, only a one-time interaction is required between users and servers to negotiate their session key. This is because Chebyshev’s chaotic map and symmetric encryption/decryption are skillfully integrated during the negotiation process.
(3)
Leveraging random oracle models, the security of the proposed PUF-LTA is theoretically proven. To validate the practicality and efficiency of the proposed PUF-LTA for multiserver architectures, comparisons of security performance, and computation complexity are provided.
The structure of this paper is organized as follows. The related work of multiserver authentication and the preliminaries of this paper are presented in Section 2 and Section 3, respectively. We briefly review Yu et al.’s scheme in Section 4. Section 5 clarifies the vulnerabilities of their scheme. The workflow of the proposed PUF-LTA is presented in Section 6, while the formal and informal security analysis of the PUF-LTA are comprehensively provided in Section 7. Section 8 demonstrates the performance comparison and results discussion against existing methods. We conclude our work in Section 9.

3. Preliminaries

3.1. Chebyshev’s Chaotic Map

Chebyshev’s chaotic map can defined as T n x = 2 x T n 1 x T n 2 ( x ) , where n 2 , n Z , x   [ 1 ,   1 ] , T 0 x = 1 , T 1 x = x . When x   1 ,   1 . The semigroup property of Chebyshev’s chaotic map can be represented as T r T s x = T s r x = T s T r x [].
Zhang et al. [] stated that the semigroup property of Chebyshev’s chaotic map holds for Chebyshev polynomials defined on the interval [ , + ] . That is to say, T r T s x = T s r x = T s T r x , where T n x = cos n × arccos x   m o d   p , n 2 , n Z , x     [ , + ] , and p is a large prime number.
The chaotic map discrete logarithm problem ( C M D L P ) : If there is a Chebyshev chaotic map y = T r x   m o d   p , where p is a large prime number, and x and y are known, it is computationally infeasible in polynomial-time to calculate the value of r .
The Computation of Chaotic Maps Diffie–Hellman Problem ( C M C D H P ) : If there is an extended Chebyshev polynomial T s x   m o d   p and T r x   m o d   p , where x     [ , + ] , and p is a large prime number, C M C D H P means that it is computationally infeasible in polynomial-time to calculate the value of T s r x   m o d   p .

3.2. Fuzzy Extractor

Biometric information is not completely consistent for the same user (e.g., the different contact surfaces during fingerprint collection). Moreover, considering the threat of information leakage, users hesitate to upload their original biometric information to servers. Therefore, the fuzzy extraction technique is important for biometric application. Dodis et al. [] proposed the fuzzy extractor algorithm to extract and recover the biometric information. The fuzzy extractor algorithm consists of the generation algorithm G e n   · and the reproduction algorithm R e p ( · ) . In contrast to conventional cryptographic keys, their algorithm is neither precisely reproducible nor distributed uniformly. That is, the fuzzy extractor algorithm extracts a uniformly distributed key from repeated noisy readings of a high-entropy secret.
(1)
The generation of the biological key:
σ ,   τ   = G e n   B i o
B i o is the biological information and G e n   · is the generation function, σ is the biological key, and τ is the recovery parameter which should be saved.
(2)
The recovery of the biological key:
σ = R e p B i o ,   τ
R e p   · is the recovery function, σ is the recovery biometric key, B i o is a new biometric information input by user, and τ is the recovery parameter that is saved in the user’s device.

3.3. Physical Unclonable Function

The Physical Unclonable Function could generate a unique ‘fingerprint’ or trust anchor for a physical entity []. Actually, every integrated circuit (IC) has some subtle differences because normal manufacturing cannot avoid slight deviations. For a physical entity with an integrated circuit (IC), the PUF exploits this deviations to generate a unique challenge–response pair.
The PUF has the properties as follows:
  • The output of a PUF is dependent on the physical characteristics of the IC.
  • The output of a PUF must be unpredictable.
  • The PUF circuit is unclonable.
  • The output of the PUF will change as long as any alteration happens to the physical characteristics of the system.
Ideally, physically cloning a PUF is infeasible, and PUFs do not store any secrets but generate the response upon a challenge. More importantly, when a PUF circuit is attacked by any active manipulation (e.g., side-channel attacks), its CRP mapping mechanism will be destructed and the challenge-response pair will also change.

3.4. System Model

Figure 1 is a multiserver model. Any service provider may have one or more servers, and users can use multiserver authentication to obtain services from these servers. A multiserver system includes users, servers, and a registration center (RC). RC will publish the system initialization parameters first; then users and servers should register to the RC through a secure channel, respectively; finally, over a public channel, a user and a server will conduct mutual authentication, negotiate the session key, and securely communicate.
Figure 1. Network model of a multiserver environment.

3.5. Adversarial Model

According to the Dolev–Yao model [] and the security requirements of multiserver authentication, we define the adversary model as follows:
(1)
An adversary could register as a legitimate user or server, but the registration center is completely trustworthy.
(2)
Users and servers can conspire to impersonate another entity. For example, they can impersonate a user to access another server or impersonate a server to provide false resources to other users.
(3)
An adversary has the ability to intercept, eavesdrop, modify, and replay all messages transmitted by public channels.
(4)
An adversary can obtain any two of the three factors to launch attacks but cannot simultaneously obtain all three factors.

4. Review of a Multi-Server Authentication Scheme

Yu et al. [] proposed an extended chaotic-map-based authentication and key agreement scheme for a multiserver environment. Their scheme mainly consists of five phases: the system setup phase, server registration phase, user registration phase, login and authentication phase, and user password and biometric update phase. Here, we omit the last phase. Table 1 lists the notations used in this paper.
Table 1. Notations used in this paper.

4.1. System Setup Phase

The R C chooses two random numbers x and y in [ , + ] and sets them as the system master keys. Then, R C chooses a secure one-way hash function h ( · ) .

4.2. Server Registration Phase

Step 1: S j chooses identity S I D j and transmits it to R C over a secure channel.
Step 2: Once S I D j is received, R C computes K j = h ( S I D j y ) and publishes { S I D j ,   z } . Afterward, R C transmits K j back to S j through a secure channel.
Step 3: S j receives K j and stores it safely.

4.3. User Registration Phase

Step 1: U i inputs I D i and P W i , and enters B i o i . Then, U i utilizes the biometric hash function B H ( · ) to obtain b i and computes P I D i = h ( I D i b i ) , P W B i = h ( P W i b i ) . Finally, U i sends I D i , P I D i , P W B i to R C to register over a secure channel.
Step 2: Upon U i s registration request, R C calculates A i = h I D i P W B i m o d   n , B i = h ( P I D i x ) , C i = B i P W B i , where 2 4 n 2 8 . Then, R C computes D i j = h ( B i K j ) , E i j = B i K j , F i j = D i j h ( B i ) , where 1 j m , and m denotes the maximum number of servers. Next, { A i , C i , E i j , F i j , n , h · , h x y , z } are stored into the S C i , and S C i is distributed to each U i safely.
Step 3: U i keeps the S C i card safely.

4.4. Login and Authentication Phase

Step 1: U i inserts S C i and inputs I D i , P W i , and enters B i o i . S C i calculates b i = B H ( B i o i ) , P I D i = h ( I D i b j ) , and P W B i = h ( P W i b i ) and then verifies whether A i = h I D i P W B i m o d   n ; if not, S C i rejects the session; else, S C i randomly selects a number n i , chooses the server’s identity S I D j , and computes N i = T n i ( z ) , P i j = E i j h ( S I D j h ( x y ) N i ) , N k = h ( B i N i ) , D i j = F i j h ( B i ) , C I D i j = P I D i h ( P i j B i ) , and M 1 = h ( B i D i j C I D i j N k ) . Finally, U i sends { P i j , C I D i j , N i , M 1 } to server S j .
Step 2: Upon the login request from U i , S j calculates E i j = P i j h ( S I D j h ( x y ) N i ) , B i = E i j K j , D i j = h ( B i K j ) , N k = h ( B i N i ) , and M 1 = h ( B i D i j C I D i N k ) and verifies whether M 1 equals M 1 . If not, S j rejects the session. Else, S j selects a random number n j and calculates N j = T n j ( z ) , P I D i = C I D i j h ( P i j B i ) , M 2 = h ( P I D i P i j D i j B i S I D j N j ) , and M 3 = N k N j . Afterward, S j sends { M 2 , M 3 } to U i .
Step 3: Upon receiving { M 2 ,   M 3 } , U i calculates N j = M 3 N k . U i verifies whether M 2 = h ( P I D i P i j D i j B i S I D j N j ) , if not, U i rejects the session; otherwise, U i computes M 4 = h( B i D i j N j S I D j ) and T i j = T n i ( N j ) and obtains the session key S K i j = h ( P I D i P i j T i j ) . Finally, U i sends { M 4 } to S j .
Step 4: S j receives M 4 and verifies whether M 4 = h( B i D i j N j S I D j ) holds, if not, S j discards the session; otherwise, S j calculates T j i = T n j ( N i ) and negotiates the same session key with U i : S K j i = h P I D i P i j T j i = h P I D i P i j T i j = S K j i .

5. Cryptanalysis of a Multi-Server Authentication Scheme

5.1. User Traceability

Assuming that an adversary is a legitimate user U a , he/she can register a legal U a and obtain S I D j , h ( x y ) .
During the login and authentication phase, P i j = E i j h ( S I D j h ( x y ) N i ) , where N i was transmitted in public channel, S I D j is public, and h ( x y ) is written into the adversary’s S C i . Then, the adversary can extract E i j from P i j , where E i j = B i K j = h ( P I D i x ) h ( S I D j y ) . It is obvious that E i j is bound with P I D i .
In this case, if an adversary is a legal user, they can distinguish whether two sessions are initiated by one user through E i j .

5.2. User Impersonation Attack

Firstly, we assume that an adversary is a legal user U a and they can register as a legal U a . The adversary computes his/her P W B i = h ( P W i b i ) and obtains C i = B i P W B i , E i j = B i K j from R C . Then, the adversary obtains B i = C i P W B i and finally obtains the server’s K j = E i j B i .
Then, the messages sent in the public channel can be eavesdropped on by the adversary. The adversary sends P i j , C I D i j ,   N i ,   M 1 to the server to impersonate the legal user. As long as the server sends M 2 , M 3 , the adversary computes E i j = P i j     h ( S I D j h ( x y ) N i ) , B i = E i j K j , N j = M 3 h ( B i N i ) obtains P I D i = C I D i j h ( P i j B i ) , D i j = h ( B i K j ) , and computes M 4 = h ( B i D i j N j S I D j ) .
Finally, S j certifies that the adversary is legal after receiving M 4 .

5.3. Server Impersonation Attack

At first, an adversary can register a legal U a , therefore, the adversary knows P W B i = h ( P W i b i ) and obtain C i = B i P W B i , E i j = B i K j from R C . Then, the adversary obtains B i = C i P W B i , and finally gets server’s K j = E i j B i .
Then, the adversary can eavesdrop on the messages in the public channel and obtain P i j ,   C I D i j ,   N i ,   M 1 from U i . The adversary tries to impersonate the legal server. The adversary computes E i j = P i j     h S I D j h x y N i , B i = E i j K j , D i j = h B i K j ,   N k = h B i K j ,   M 1 = h B i D i j C I D i j N k and verifies whether M 1 equals M 1 . Next, the adversary chooses a random number n j and calculates N j = T n j ( z ) , P I D i = C I D i j h ( P i j B i ) , M 2 = h ( P I D i P i j D i j B i S I D j N j ) , M 3 = N k N j . Afterward, the adversary sends { M 2 , M 3 } to U i .
Next, U i computes N j = M 3 N k , verifies whether M 2 = h ( P I D i P i j D i j B i S I D j N j ) holds, computes M 4 = h( B i D i j N j S I D j ), T i j = T n i ( N j ) , and obtains the session key S K i j = h ( P I D i P i j T i j ) . Finally, U i sends { M 4 } to the adversary.
In the end, the adversary computes S K j i = h ( P I D i P i j T i j ) and impersonates the server successfully.

5.4. Man-in-the-Middle Attack

At first, an adversary can register a legal U a ; therefore, the adversary knows P W B i = h ( P W i b i ) and obtains C i = B i P W B i , E i j = B i K j from R C . Then, the adversary obtains B i = C i P W B i and finally obtains the server’s K j = E i j B i .
Next, the adversary selects a random number n a and calculates N a = T n a ( z ) .
After receiving P i j , C I D i j , N i , M 1 from U i , the adversary computes E i j = P i j h S I D j h x y N i , B i = E i j K j , D i j = h B i K j , N k = h B i K j , M 1 = h B i D i j C I D i j N k and verifies whether M 1 equals M 1 . Next, the adversary computes P I D i = C I D i j h ( P i j B i ) , M 2 = h ( P I D i P i j D i j B i S I D j N a ) , and M 3 = N k N a . Afterward, the adversary sends { M 2 , M 3 } to U i .
After receiving { M 2 , M 3 } from the adversary, U i computes N a = M 3 N k , verifies whether M 2 = h ( P I D i P i j D i j B i S I D j N j ) holds, computes M 4 = h( B i D i j N j S I D j ), T i a = T n i ( N a ) , and obtains the session key S K i a = h ( P I D i P i j T i a ) . Finally, U i sends { M 4 } to the adversary. In the end, the adversary computes S K a i = h ( P I D i P i j T i a ) and impersonates the server successfully.
Meanwhile, the adversary computes P i j = E i j h S I D j h x y N a , C I D i j = P I D i h ( P i j B i ) , and M 1 = h B i D i j C I D i j N a and sends { P i j , C I D i j , M 1 , N a } to server S j .
After receiving { P i j ,   C I D i j , M 1 ,   N a } from the adversary, server S j computes E i j = P i j h ( S I D j h ( x y ) N a ) , B i = E i j K j , D i j = h ( B i K j ) , N k = h ( B i N a ) , and M 1 = h ( B i D i j C I D i N k ) and verifies whether M 1 equals M 1 . Then, S j chooses a random number n l and calculates N j = T n j ( z ) , P I D i = C I D i j h ( P i j B i ) , M 2 = h ( P I D i P i j D i j B i S I D j N j ) , and M 3 = N k N j . Afterward, S j sends { M 2 , M 3 } to U i , but the message is hijacked by the adversary. After the adversary receives { M 2 ,   M 3 } and computes N j = M 3 N K , M 4 = h( B i D i j N j S I D j , T a j = T n i ( N j ) , they obtains the session key S K a j = h ( P I D i P i j T a j ) . Finally, the adversary sends { M 4 } to S j .
Step 4: S j receives { M 4 } and verifies whether M 4 equals h( B i D i j N j S I D j ), if not, S j rejects the session; otherwise, S j verifies that U a is the legitimate user. Then, S j calculates T j a = T n j ( N a ) and negotiates the session key with the adversary: S K j a = h P I D i P i j T j a = h P I D i P i j T a j = S K j a .
Finally, the adversary commits a man-in-the-middle attack successfully.

5.5. Three-Factor Security

According to the definition of three-factor security, if an adversary can obtain the user’s biometric B i o i and the information { A i ,   C i ,   E i j ,   F i j ,   n ,   h · ,   h x y ,   z } stored in smart card S C i , then the adversary can guess the U i ’s password P W U i and compute b i = B H ( B i o i ) , P W B i = h ( P W U i b i ) , B i = C i P W B i , K j = E i j B i , and D i j = F i j h ( B i ) and check whether D i j = h ( B i K j ) or not. If yes, the guessed password P W U i is correct. Otherwise, they reguess it again till the correct password is found.
Once the adversary obtains the correct password, he/she can know the correct B i ,   K j , D i j . And the adversary can also obtain { P i j ,   C I D i j ,   N i ,   M 1 } from the public channel and obtains P I D i   = C I D i j   h ( P i j B i ) . Because P I D i = h ( I D i b i ) , the adversary can guess the correct I D i , and the adversary can also launch user impersonation attacks.
Therefore, Yu et al.’s scheme cannot achieve three-factor security.

6. The Proposed Scheme

The proposed scheme consists of five phases: (1) System initialization. (2) Sever registration. (3) User registration. (4) Mutual authentication and key agreement. (5) User password and biometric update phase.

6.1. System Initialization

The R C selects two random numbers x and y in , + as master keys of the system. Then, R C chooses a secure one-way hash function h ( · ) .

6.2. Sever Registration

R C selects S I D j as an identity of server S j , computes K j = h ( S I D j x ) , and generates a random number a s j , computes A s j = T a s j ( z ) , then sends K j ,   a s j to S j through a secure channel, and then publishes { S I D j , A s j } .
After receiving K j , a s j from R C , S j generates a challenge C j and computes R j = P U F C j , P K j = K j h R j 1 , P A s j = a s j h R j 2 , and then S j stores S I D j , z , P K j , P A s j , C j , P U F ( · ) secretly.
Figure 2 depicts this phase. It is worth mentioning that using 1 and 2 in calculating the hash functions of P K j and P A s j can reduce the problem of selecting and storing random numbers.
Figure 2. Sever registration phase.

6.3. User Registration

Step 1: The user U i generates an identity number I D i and password P W i and inputs their biometrics B i o i . Then, the fuzzy function G e n ( · ) is utilized to obtain σ i ,   τ i   . Then, U i makes a request { I D i } to the registration center R C to register over a secure channel.
Step 2: Upon the request of U i , R C calculates P I D i = E x I D i t i , where t i is registration time, C i j = h ( P I D i K j ) . And then, R C sends { P I D i , C i j } to U i over a secure channel.
Step 3: Upon sending the message { P I D i , C i j } from R C , U i calculates A i = h I D i P W i σ i m o d   n , n ( 2 4 , 2 8 ) and generates a challenge c i and computes R i = P U F ( c i ) , P C i j = C i j h ( σ i I D i P W i R i j ) , P P I D i = P I D i h ( R i P W i I D i σ i j ) . Finally, U i stores {PPIDi, Ai, PCi, ci, PUF (·), n, h(·), τ i , R e p ( · ) } into S C i and U i keeps card S C i safely.
Figure 3 depicts this phase. It is worth mentioning that using m o d   n when calculating A i can effectively resist password and identity guessing attacks.
Figure 3. User registration phase.

6.4. Mutual Authentication and Key Agreement

Figure 4 depicts mutual authentication and key agreement phase.
Figure 4. Mutual authentication and key agreement.
Step 1: U i inserts smart card S C i and inputs the identity number I D i , password P W i , and biometrics B i o i . Then, S C i computes σ i = R e p B i o i , τ i and verifies whether A i = h I D i P W i σ i m o d   n holds, if not, S C i rejects the session; otherwise, S C i computes R i = P U F ( c i ) , C i j = P C i j h ( σ i I D i P W i R i j ) , P I D i = P P I D i h ( R i P W i I D i σ i j ) . Then, S C i generates two random numbers, n i 1 , n i 2 , and selects the identity of the server S I D j and computes θ 1 = T n i 1 ( z ) , θ 2 = E T n i 1 A s j ( P I D i , n i 2 , T 1 ) , θ 3 = h ( C i j n i 2 T 1 S I D j P I D i ) . U i sends { θ 1 , θ 2 , θ 3 } to S I D j via a public channel.
Step 2: Upon the login request from U i , S j decrypts θ 2 and obtains P I D i , n i 2 , T 1 = D T a s j θ 1 ( θ 2 ) . Then, S j verifies the freshness of T 1 and computes C i j = h ( P I D i K j ) . If θ 3 h ( C i j n i 2 T 1 S I D j P I D i ) , S j rejects the session; otherwise, S j generates a random number n j and calculates θ 4 =   T n j ( z ) , S K j i = h ( T n j ( θ 1 ) P I D i S I D j T 1 T 2 ) , θ 5 = E n i 2 ( n i 2 , θ 4 , T 2 , S K i j ) . Finally, S j sends { θ 5 } to U i through a public channel.
Step 3: U i receives { θ 5 } from S j and decrypts it via Decrypt n i 2 , θ 4 , T 2 , S K j i = D n i 2 ( θ 5 ) . U i checks the freshness of T 2 and the validity of n i 2 . Then, U i computes S K = h ( T n i 1 ( θ 4 ) P I D i S I D j T 1 T 2 ) . If S K j i S K , U i terminates the session; othewiser U i sets the session key S K i j = S K = h ( T n i 1 ( θ 4 ) P I D i S I D j T 1 T 2 ) = S K j i . The mutual authentication between U i and S j is established successfully.

6.5. User Password and Biometric Update Phase

Step 1: U i inserts card S C i , inputs I D U i and P W i , and their biometrics B i o i . Then, S C i computes σ i = R e p B i o i , τ i and verifies whether A i equals h I D i P W i σ i m o d   n , if not, S C i discards the login request; otherwise, S C i asks U i to enter a new password and new biological information.
Step 2: Upon receiving the new password P W i n e w and new biometric feature B i o i n e w of U i , S C i uses the fuzzy extractor to calculate σ i n e w , τ i n e w = G e n B i o i n e w , A i n e w = h I D i P W i n e w σ i n e w m o d   n , P C i j n e w = P C i j h ( σ i I D i P W i R i j ) h ( σ i n e w I D i P W i n e w R i j ) , P P I D i n e w = P P I D i h ( R i P W i I D i σ i j ) h ( R i P W i n e w I D i σ i n e w j ) .
Step 3: S C i replaces P P I D i n e w , A i n e w , P C i j n e w , τ i n e w with P P I D i , A i , P C i j , and τ i .

7. Security Analysis

7.1. Provable Security

Based on the random oracle model, we formally prove the semantic security of our scheme below:
Our scheme is denoted as Scheme II and involves three entities:
(a)
A user U i with identity I D i , password P W D i , and biometrics B i o i ;
(b)
A registration center R C with a private key x ;
(c)
An application server S j with identity S I D j .
They all are treated as an oracle with three possible states:
(a)
A c c e p t e d ;
(b)
R e j e c t e d ;
(c)
N o   o u t p u t .
In this model, there is a probabilistic polynomial-time ( P P T ) adversary A and a challenger C . The security of our scheme is proved by a challenge–response game between the P P T adversary A and the challenger C . In this game, A simulates varieties of attacks by inquiring to C in polynomial-time. The queries are listed as follows:
(1)
Hash h i ( x i ) : An initially empty list L h i is maintained by challenger C in this query. When A executes this query with input x i , C returns an output y i if the tuples ( x i , y i ) exists. Otherwise, challenger C selects a random number y i Z q and sends y i to A . Meanwhile, C inserts ( x i , y i ) in L h i to maintain consistency.
(2)
Execute ( U i t , S j t ): In this query, the adversary A can eavesdrop on the entire authentication process of Scheme II. If A asks C to execute this query, C calculates the messages according to the steps in II and returns the results to A .
(3)
Send ( U i t / S j t ,   M s g ): In this query, A can attack Scheme II actively. When A executes this query with a message M s g , C checks if M s g is valid. If it is valid, C calculates some results as the steps of Scheme II; otherwise, C ignores this query.
(4)
Reveal ( U i t ): In this query, C returns the current session key between U i t and A S j t to A .
(5)
Corrupt ( U i t , c ): A can obtain any two of three factors: password and smart card, smart card and biometric, or biometric and password. It is impossible to obtain three factors simultaneously. In this query, C outputs different results as follows:
If c = 0, C outputs the secret data stored in S C i of U i to A .
If c = 1, C outputs the password P W i of U i to A .
If c = 2, C outputs the biometric information B i o i of U i to A .
(6)
Test ( U i t ): In this query, C generates a random secret coin b { 0,1 } . If b = 1, C returns A with the correct session key. If b = 0, C randomly generates a number with the same length of the session and returns it to A .
Definition 1
(AKA-Secure). Pr[S] is denoted as the success probability of  A  to breach Scheme II. If  A  executes the test query and guesses a correct bit  b { 0 ,   1 } , we say that  A  breaches the semantic security of Scheme II. Then, the advantage of  A  to breach the semantic security of Scheme II is denoted as  E x p I I A K A ( A )  =  | P r S 1 2 | , where AKA represents the authenticated key agreement. Our Scheme II achieves semantic  A K A s e c u r e  if  E x p I I A K A  is negligible for any  P P T  adversary  A .
Theorem 1.
We assume that  D  is the password space,  D   10 6 ,  k  represents the size of the biometric information, and  l  represents the length of  h ( · ) . Suppose  q s ,   q e , and  q h  denote the number of queries that  A  executes send, execute, and hash  h i . Then, we have
E x p I I , A A K E t   q h 2 2 l + q s + q e 2 2 l + 2 q s · max 1 D , 1 2 k , f p + q s 2 l 1 + 2 q h · q s + q e 2 E x p A C D H t ,
In polynomial-time  t , the probability of  A  to successfully solve the CDH problem is denoted as  E x p A C D H ( t ) , where  t = t + ( q s + q e ) · T e p .
Proof. 
We prove the security of the session key in Scheme II by executing the following games G i , ( i = 0 , 1 , 2 , 3 , 4 ) . Let S i refer to the event that A tries to breach the secrecy of the session key negotiated in each G i . Additionally, we assume that an event E may happen when A executes Scheme II such that the event E is independent of S i and can be detected by C . It is noteworthy that S i and S i + 1 are indistinguishable, except when E occurs.
Therefore,
P r S i + 1 P r S i   Pr E .
(1)
G 0 : In this game, the simulation of breaching the semantic security of Scheme II is executed in the random oracle model (ROM), and we have
E x p I I A K E t = | Pr S 0 1 2 |
(2)
G 1 : In this game, A simulates the ROM by executing queries, including execute, send, and hash queries. In the hash query, A tries to find the collisions for θ 3 . From the conclusion of a birthday attack, the success probability of a hash collision is q h 2 2 l + 1 . Executing a send query or an execute query can generates the message. Therefore, the success probability of A to find a collision is controlled by at most q s + q e 2 2 l + 1 , where h i · : { 0 ,   1 }   { 0 ,   1 } l . Then, we have:
Pr S 1 Pr S 0   q h 2 2 l + 1 + q s + q e 2 2 l + 1 .
(3)
G 2 : Here, A can execute Corrupt ( U i t ,   c ) to obtain the secret information stored in S C i on the condition that the device is lost or stolen. A simulates as follows:
(a)
A executes a Corrupt ( U i t ,   2 ) query to guess the password of U i from password space D within a q s number of send queries. Hence, the probability of a successful guess is q s D .
(b)
A executes a Corrupt ( U i t ,   1 ) query and speculates the biometric key σ i of U i .
(i)
The probability of successful guessing σ i ( k -bit) is q s 2 k .
(ii)
A can take advantage of the false positive f p to guess σ i , which is chosen randomly from a uniform distribution { 0 ,   1 } k .
Because A can guess either the password or biometric key but not both, A can execute either the < C o r r u p t U i t ,   0 , C o r r u p t ( U i t ,   1 ) > or < C o r r u p t U i t ,   0 , C o r r u p t ( U i t ,   2 ) > queries. The total probability of success is max { q s · ( 1 D , 1 2 k , f p ) } .
| Pr [ S 2 ] Pr [ S 1 ] |   max { q s · ( 1 D , 1 2 k , f p ) } .
(4)
G 3 : In this game, to breach the security of mutual authentication, A executes the queries of send ( S t a r t ,   U i ), send ( θ 1 , θ 2 ,   θ 3 ,   S j ), and send ( θ 5 ,   U i ) to C .
(a)
Send ( S t a r t ,   U i ) query: A selects two random numbers, n i 1 ,   n i 2     Z q , and calculates θ 1 = T n i 1 ( z ) ,  θ 2 = E T n i 1 A s j ( P I D i ,   n i 2 ,   T 1 ) ,  θ 3 = h ( C i j n i 2 T 1 S I D j P I D i ) . Then, the query answers θ 1 , θ 2 ,   θ 3 .
(b)
Send ( θ 1 , θ 2 ,   θ 3 ,   S j ) query: Compute P I D i ,   n i 2 ,   T 1 = D T a s j θ 1 ( θ 2 ) , C i j = h ( P I D i K j ) . If θ 3     h ( C i j n i 2 T 1 S I D j P I D i ) ,  S j rejects the session; otherwise, S j generates a random number n j and calculates θ 4 =   T n j ( z ) ,    θ 5 = E n i 2 ( n i 2 ,   θ 4 ,   T 2 ,   S K i j )   S K j i = h ( T n j ( θ 1 ) P I D i S I D j T 1 T 2 ) . Afterwards, the query responds with θ 5 .
(c)
Send ( θ 5 ,   U i ) query: Compute n i 2 ,   θ 4 ,   T 2 ,   S K j i = D n i 2 ( θ 5 ) . U i checks the freshness of T 2 and the validity of n i 2 . Then, U i computes S K = h ( T n i 1 ( θ 4 ) P I D i S I D j T 1 T 2 ) . If S K j i   S K U i terminates the session; otherwise U i   S K i j = S K = h ( T n i 1 ( θ 4 ) P I D i S I D j T 1 T 2 )  =  S K j i .
Assume that the adversary A tries to generate the false value θ 1 = T n i 1 z ,   θ 2 = E T n i 1 A s j P I D i ,   n i 2 ,   T 1 ,   θ 3 = h ( C i j n i 2 T 1 S I D j P I D i ) . This game G 3 is indistinguishable from the previous game G 2 , except when S j refuses a valid θ 1 , θ 2 ,   θ 3 or U i refuses a valid θ 5 . Therefore, we have
Pr S 3 Pr S 2 q s 2 l .
(5)
G 4 : In this game, A tries to guess the S K i j . If A tries to compute the session key S K i j = h ( T n i 1 ( T n j ( z ) ) P I D i S I D j T 1 T 2 ) , the CDH problem must be solved for the instance θ 1 , θ 2 ,   θ 3 within the polynomial-time bound t = t + ( q s + q e ) · T e p , where T 2 = C D H T n i 1 ( z ) ,   T n j ( z ) = T n i 1 ( T n j ( z ) ) , since { n i 1 ,   n j } are randomly chosen from Z q uniformly, and A either implements the execute query or send query.
Therefore, we obtain
| Pr [ S 4 ]   Pr   [ S 3 ] |     q h q s + q e 2 E x p A C D H ( t ) .
If A employs a private oracle h ( · ) , then C seeks the valid value in L h i and conveys it to A . Otherwise, C sends a random bit string s t     { 0 ,   1 } l . A tries to guess a bit b   { 0 ,   1 } , and the probability of successfully guessing b is not more than 1 2 . Therefore, we obtain
Pr [ S 4 ] = 1 2 .
Finally, we add (1)–(7) and have
E x p I I A K A t   q h 2 2 l + q s + q e 2 2 l + 2 q s · max 1 D , 1 2 k , f p + q s 2 l 1 + 2 q h · q s + q e 2 E x p A C D H ( t ) .

7.2. Informal Security Analysis

(1)
Perfect Forward Secrecy
This feature means that even if the password and biometrics of user are exposed to an adversary, all prior session keys still remain secure. We make the assumption that all private keys K j , a s j of the server and { I D i , P W i , B i o i } of the user are compromised, and the adversary obtains { P P I D i ,   A i ,   P C i j , c i , P U F · ,   n 0 ,   h · , τ i ,   R e p ( · ) } , which is stored in the smart card. Then, the adversary still cannot acquire the P I D i due to the property of the PUF. Moreover, because the session key is S K i j = h ( T n j ( θ 1 ) P I D i S I D j T 1 T 2 ) , even if an adversary can know all the long-term keys used in this protocol, it is computationally infeasible for the adversary to calculate T n j ( T n i 1 ( z ) ) because of the intractability of the Computational Diffie–Hellman Problem (CDHP).
(2)
Known-Key Security
This property means that the adversary cannot compute the next session key, even if he/she has obtained some previous session keys. To be specific, the session key is variable in our scheme due to the random number { n i 1 , n i 2 ,   n j } . Therefore, the adversary cannot know any useful information and cannot compute the next session key, even if they can acquire the session key.
(3)
Session Key Secrecy
Based on our protocol, the user and the server can negotiate a session key for later communication when they finish the mutual authentication and key agreement phase. The session key will be S K i j = h ( T n i 1 ( T n j ( z ) ) P I D i S I D j T 1 T 2 ) = h ( T n j ( T n i 1 ( z ) ) P I D i S I D j T 1 T 2 ) = S K j i .
(4)
User Anonymity and Untraceability
In our scheme, although the authentication request message { θ 1 , θ 2 , θ 3 } includes the user’s pseudoidentity P I D i , the adversary cannot obtain the P I D i because of the unknown encryption key T n i 1 A s j . Specifically, the user computes θ 1 = T n i 1 z , θ 2 = E T n i 1 A s j P I D i , n i 2 , T 1 , θ 3 = h C i j n i 2 T 1 S I D j P I D i . It is clear that the user’s identity P I D i is encrypted by a key negotiate between the user and the server. Moreover, the R C computes P I D i = E x I D i t i , where t i is the registration time. As a result, the user is anonymous to the server and adversary.
In addition, the random numbers n i 1 , n i 2 are different in each session, so the authentication request message { θ 1 ,   θ 2 ,   θ 3 } is also different in each session. So, our scheme achieves untraceability.
(5)
Replay Attack
In our scheme, three random numbers { n i 1 ,     n i 2 ,   n j } are utilized to resist the replay attack. Therefore, even if an adversary replays the message { θ 1 ,   θ 2 ,   θ 3 }, they cannot calculate the session key without knowing the random numbers { n i 1 ,     n i 2 ,   n j } .
(6)
Offline Identity/Password Guessing Attacks
Because the user’s identity and password is included in A i = h I D i P W i σ i   m o d   n , n   ( 2 4 ,   2 8 ) , if an adversary obtains all the information stored in the device, obtains the user’s biometric information, and guesses ( I D i ,   P W i ) to satisfy A i = h I D i P W i σ i   m o d   n , n   ( 2 4 ,   2 8 ) , there are D p w × | D i d | / n     2 32 candidates for the ( I D i ,   P W i ) pair when n = 256. Moreover, the adversary cannot know which pair is right due to the property of the PUF.
(7)
Three-Factor Secrecy
If an adversary can know the user’s biometric information B i o i and all the information stored on the device, he/she cannot guess the correct ( I D i ,   P W i ) pair. If an adversary can know the user’s biometric information B i o i and password, he/she cannot know the { P I D i ,   C i j } from the authentication messages. If an adversary can know the password and all the information stored in the device, he/she cannot know the user’s biometric information B i o i .
(8)
Device Lost Attack
M D i of U i stores { P P I D i , A i , P C i j , c i , P U F · , n 0 , h · , τ i , R e p ( · ) } , where A i = h I D i P W i σ i m o d   n , R i = P U F c i , P C i j = C i j h ( σ i I D i P W i R i j ) , P P I D i = P I D i h ( R i P W i I D i σ i j ) . So, an adversary cannot obtain { P I D i , C i j , P C i j } due to the property of the PUF. Therefore, according to above analysis, we can know that an adversary can’t obtain any valuable information to launch attacks even if he/she gets the information stored in device.
(9)
User/Server Impersonation Attacks
Suppose an adversary wants to impersonate the user to access the server; however, they cannot forge the valid message { θ 1 ,   θ 2 ,   θ 3 }, because they cannot know { P I D i , C i j , P C i j }, which are protected by the PUF.
Suppose an adversary wants to impersonate the server to pass the authentication by the user, however, they cannot forge the valid message θ 5 . Moreover, the adversary does not know the secret key a s j of the server, so the secret message θ 2 cannot be decrypted. So the adversary cannot obtain { P I D i ,   n i 2 ,   T 1 } and cannot forge a session key.
(10)
Man-in-the-Middle Attack
Our scheme achieves trustworthy mutual authentication between U i and S j , and any adversary can neither impersonate users nor servers. So, our scheme can resist man-in-the-middle attacks.
(11)
Stolen-Verifier Attack/Physical Capturing Attacks
Because the important information is stored in the user’s device and the servers, and they are all protected by the PUF, our scheme can resist stolen-verifier attacks and physical capturing attacks.

8. Performance Analysis

In Table 2, we present a comparison of the security features between our scheme and some related multiserver schemes [,,,,,].
Table 2. Security features comparison.
We also simulated the computation cost in the environment of Intel Pentium4 2600 MHz processor with 1024 MB RAM. Table 3 displays the execution time for different operations. Table 4 shows the comparison of computation costs between ours and related protocols. The computation cost of bitwise operation like XOR is negligible.
Table 3. Execution time of cryptographic operations.
Table 4. Comparison of Computation Costs.
We focus on the mutual authentication and key agreement phase because the server and user registration phase executes only once. In terms of the mutual authentication and key agreement phase, our scheme’s computation cost for a user is 86.56 ms, and it is 85.56 ms for a server. According to Table 4, it is obvious that our authentication scheme costs less than [,,,]. Our scheme’s computation costs are more than [,], but this is acceptable because our scheme has stronger security.
It is assumed that the output of hash function H ( · ) is 160 bits (SHA-1 hash function), the block size of symmetric encryption/decryption (AES) is 128 bits, the elliptic curve point is 320 bits, and the identity, random number, timestamp, and other parameters is 128 bits. We focus on the mutual authentication and key agreement phase because the server and user registration phase executes only once. During the mutual authentication and key agreement phase, only two messages, { θ 1 ,   θ 2 ,   θ 3 } and { θ 5 } , are transmitted in our scheme. To be specific, θ 1 = T n i 1 z ,   θ 2 = E T n i 1 A s j ( P I D i ,   n i 2 ,   T 1 ) , θ 3 = h ( C i j n i 2 T 1 S I D j P I D i ) , and θ 5 = E n i 2 ( n i 2 ,   θ 4 ,   T 2 ,   S K j i ) . The length of two interactive messages is (128 + 3 × 128 + 160) + 128 × ((128 + 128 + 128 + 160)/128) = 1312.

9. Conclusions

We have shown that Yu et al.’s three-factor multiserver authentication scheme has several security flaws, and we designed a new three-factor lightweight authentication based on Chebyshev’s chaotic map and the PUF. We analyzed our authentication scheme through the random oracle model and proved our scheme is secure. Furthermore, our scheme eliminates the requirement for RC during mutual authentication and only requires a one-time mutual interaction. Therefore, our scheme is more efficient and practical in multiserver environments, especially for resource-restrained mobile devices.

Author Contributions

Y.Z., designing, experimentation, writing, and security proof; Q.X., conceptualization, methodology, validation, review, editing, revise, funding. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Natural Science Foundation of China (Grant No. U21A20466), and the Hangzhou Joint Fund of the Zhejiang Provincial Natural Science Foundation of China (Grant No. LHZSZ24F020002).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Celik, A.; Romdhane, I.; Kaddoum, G.; Eltawil, A.M. A Top-Down Survey on Optical Wireless Communications for the Internet of Things. IEEE Commun. Surv. Tutor. 2023, 25, 1–45. [Google Scholar] [CrossRef]
  2. Tange, K.; De Donno, M.; Fafoutis, X.; Dragoni, N. A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities. IEEE Commun. Surv. Tutor. 2020, 22, 2489–2520. [Google Scholar] [CrossRef]
  3. Gai, K.; Guo, J.; Zhu, L.; Yu, S. Blockchain Meets Cloud Computing: A Survey. IEEE Commun. Surv. Tutor. 2020, 22, 2009–2030. [Google Scholar] [CrossRef]
  4. Schlette, D.; Caselli, M.; Pernul, G. A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective. IEEE Commun. Surv. Tutor. 2021, 23, 2525–2556. [Google Scholar] [CrossRef]
  5. Rawal, B.S.; Berman, L.; Ramcharan, H. Multi-client/Multi-server split architecture. In Proceedings of the The International Conference on Information Networking 2013 (ICOIN), Bangkok, Thailand, 27–30 January 2013; Volume 201, pp. 696–701. [Google Scholar]
  6. Ul Haq, I.; Wang, J.; Zhu, Y.; Maqbool, S. A survey of authenticated key agreement protocols for multi-server architecture. J. Inf. Secur. Appl. 2020, 55, 102639. [Google Scholar]
  7. Lee, T.F. Enhancing the security of password authenticated key agreement protocols based on chaotic maps. Inf. Sci. 2015, 290, 63–71. [Google Scholar] [CrossRef]
  8. Lu, Y.; Li, L.; Peng, H.; Xie, D.; Yang, Y. Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps. J. Med. Syst. 2015, 39, 65. [Google Scholar] [CrossRef]
  9. Kumari, S.; Li, X.; Wu, F.; Das, A.K.; Arshad, H.; Khan, M.K. A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener. Comp. Syst. 2016, 63, 56–75. [Google Scholar] [CrossRef]
  10. Abbasinezhad-Mood, D.; Nikooghadam, M. Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps. IEEE Trans. Industr. Inform. 2018, 14, 4815–4828. [Google Scholar] [CrossRef]
  11. Chatterjee, S.; Roy, S.; Das, A.K.; Chattopadhyay, S.; Kumar, N.; Vasilakos, A.V. Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment. IEEE Trans. Depend. Secure 2018, 15, 824–839. [Google Scholar] [CrossRef]
  12. Yu, Y.; Taylor, O.; Li, R.; Sunagawa, B. An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment. Mathematics 2021, 9, 798. [Google Scholar] [CrossRef]
  13. He, D.; Bu, J.; Chan, S.; Chen, C.; Yin, M. Privacy-Preserving Universal Authentication Protocol for Wireless Communications. IEEE Trans. Wirel. Commun. 2011, 10, 431–436. [Google Scholar] [CrossRef]
  14. Tsai, J.L.; Lo, N.W.; Wu, T.C. Novel Anonymous Authentication Scheme Using Smart Cards. IEEE Trans. Industr. Inform. 2013, 9, 2004–2013. [Google Scholar] [CrossRef]
  15. Huang, X.; Chen, X.; Li, J.; Xiang, Y.; Xu, L. Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems. IEEE Trans. Parall. Distr. 2014, 25, 1767–1775. [Google Scholar] [CrossRef]
  16. Wang, D.; He, D.; Wang, P.; Chu, C.H. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment. IEEE Trans. Depend. Secure 2015, 12, 428–442. [Google Scholar] [CrossRef]
  17. Li, L.H.; Lin, L.C.; Hwang, M.S. A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans. Neural. Networ. 2001, 12, 1498–1504. [Google Scholar]
  18. Zhang, Y.; Xu, C.; Li, H.; Yang, K.; Cheng, N.; Shen, X. PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage. IEEE Trans. Mobile. Comput. 2021, 20, 2297–2312. [Google Scholar] [CrossRef]
  19. He, D.; Wang, D. Robust Biometrics-Based Authentication Scheme for Multiserver Environment. IEEE Syst. J. 2015, 9, 816–823. [Google Scholar] [CrossRef]
  20. Odelu, V.; Das, A.K.; Goswami, A. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards. IEEE Trans. Inf. Foren. Sec. 2015, 10, 1953–1966. [Google Scholar] [CrossRef]
  21. Zhang, M.; Zhang, J.; Tan, W. Remote three-factor authentication protocol with strong robustness for multi-server environment. China Commun. 2017, 14, 126–136. [Google Scholar] [CrossRef]
  22. Sudhakar, T.; Natarajan, V.; Gopinath, M.; Saranyadevi, J. An Enhanced Authentication Protocol for Multi-Server Environment Using Password and Smart Card. Wirel. Pers. Commun. 2020, 115, 2779–2803. [Google Scholar] [CrossRef]
  23. Cho, Y.; Oh, J.; Kwon, D.; Son, S.; Yu, S.; Park, Y.; Park, Y. A Secure Three-Factor Authentication Protocol for E-Governance System Based on Multiserver Environments. IEEE Access 2022, 10, 74351–74365. [Google Scholar] [CrossRef]
  24. Herder, C.; Yu, M.D.; Koushanfar, F.; Devadas, S. Physical Unclonable Functions and Applications: A Tutorial. Proc. IEEE 2014, 102, 1126–1141. [Google Scholar] [CrossRef]
  25. Che, W.; Saqib, F.; Plusquellic, J. PUF-Based Authentication. In Proceedings of the 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), Austin, TX, USA, 2–6 November 2015; pp. 337–344. [Google Scholar]
  26. Wang, W.; Chen, Q.; Yin, Z.; Srivastava, G.; Gadekallu, T.R.; Alsolami, F.; Su, C. Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks. IEEE Internet Things 2022, 9, 8883–8891. [Google Scholar] [CrossRef]
  27. Gu, C.; Chang, C.H.; Liu, W.; Yu, S.; Ma, Q.; O’neill, M. A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication. In Proceedings of the 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Xi’an, China, 16–17 December 2019; pp. 1–6. [Google Scholar]
  28. Zhou, X.; Wang, S.; Wen, K.; Hu, B.; Tan, X.; Xie, Q. Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare. IEEE Internet Things 2023, 1. [Google Scholar] [CrossRef]
  29. Zhang, H.; Bian, W.; Jie, B.; Xu, D.; Zhao, J. A Complete User Authentication and Key Agreement Scheme Using Cancelable Biometrics and PUF in Multi-Server Environment. IEEE Trans. Inf. Forensics Secur. 2021, 16, 5413–5428. [Google Scholar] [CrossRef]
  30. He, D.; Zeadally, S.; Kumar, N.; Wu, W. Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2052–2064. [Google Scholar] [CrossRef]
  31. Ying, B.; Nayak, A. Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography. J. Netw. Comput. Appl. 2019, 131, 66–74. [Google Scholar] [CrossRef]
  32. Ul haq, I.; Wang, J.; Zhu, Y. Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks. J. Netw. Comput. Appl. 2020, 161, 102660. [Google Scholar] [CrossRef]
  33. Xiong, L.; Li, F.; He, M.; Liu, Z.; Peng, T. An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services. IEEE Trans. Cloud Comput. 2022, 10, 2309–2323. [Google Scholar] [CrossRef]
  34. Soni, P.; Pradhan, J.; Pal, A.K.; Islam, S.H. Cybersecurity attack-resilience authentication mechanism for intelligent healthcare system. IEEE Trans. Ind. Inform. 2023, 19, 830–840. [Google Scholar] [CrossRef]
  35. Kocarev, L.; Tasev, Z. Public-key encryption based on Chebyshev maps. In Proceedings of the International Symposium on Circuits and Systems, ISCAS ’03, Bangkok, Thailand, 25–28 May 2003; Volume 3, pp. 28–31. [Google Scholar]
  36. Zhang, L. Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 2008, 37, 669–674. [Google Scholar] [CrossRef]
  37. Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In Proceedings of the Advances in Cryptology—EUROCRYPT 2004, Interlaken, Switzerland, 2–6 May 2004; Cachin, C., Camenisch, J.L., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 523–540. [Google Scholar]
  38. Gao, Y.; Al-Sarawi, S.F.; Abbott, D. Physical unclonable functions. Nat. Electron. 2020, 3, 81–91. [Google Scholar] [CrossRef]
  39. Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inform. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.