Security Verification of an Authentication Algorithm Based on Verifiable Encryption
Abstract
:1. Introduction
2. Preliminaries
2.1. Cryptosystem
2.2. Verifiable Encryption
3. Authentication Algorithm Based on VE
- Registration Alice distributes her personal information to Bob.
- Verification Bob checks if the personal information distributed by Alice in advance matches the personal information sent from Alice for verification.
- Alice is the user to be authenticated.
- Bob is an authenticator and trusted by Alice.
- S is a server and untrusted by Alice.
- The channel between Alice and Bob is a secure channel that includes direct access.
- The channel between Bob and S is an insecure channel.
- Alice’s personal information is never provided to S.
- Alice sends her personal information to Bob.
- Bob generates a key k and calculates .
- Bob sends to server S and discards .
- Alice sends her personal information to Bob.
- Bob generates a key and calculates .
- Bob sends to S.
- Server S calculates and sends to Bob.
- Bob calculates the result and checks r.
- Alice sends her personal information to Bob.
- Bob generates a key and computes .
- Bob sends to server S and discards , and S stores in its database.
- Alice sends her personal information to Bob.
- Bob generates a one-time key and computes .
- Bob sends to server S.
- S computes the encrypted result , where
- Bob computes the result to obtain the distance as
4. Robustness of the Authentication Algorithm Based on VE
4.1. Theoretical Attacks
4.1.1. Ciphertext-Only Attack
4.1.2. Known-Plaintext Attack
4.1.3. Chosen-Plaintext Attack and Adaptive Chosen-Plaintext Attack
4.1.4. Chosen-Ciphertext Attack and Adaptive Chosen-Ciphertext Attack
4.2. Security Verification Using ProVerif
4.2.1. Verification Summary of the Registration Process
4.2.2. Summary of the Verification Process
4.3. Comparison
- Our algorithm does not require significant computational resources on devices because all calculations are simple XOR and addition operations.
- Many authentication schemes introduced in [14] specify the form of plaintext. By contrast, arbitrary plain texts (e.g., biometric information, images, radio-frequency identification, and credit cards) can be processed by our algorithm if personal information can be converted into binary sequences because our algorithm utilizes a generalized form.
5. Conclusions
6. Patents
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- El-Hajj, M.; Chamoun, M.; Fadlallah, A.; Serhrouchni, A. Analysis of authentication techniques in Internet of Things (IoT). In Proceedings of the 2017 1st Cyber Security in Networking Conference (CSNet), Rio de Janeiro, Brazil, 18–20 October 2017; pp. 1–3. [Google Scholar]
- El-Hajj, M.; Chamoun, M.; Fadlallah, A.; Serhrouchni, A. Taxonomy of authentication techniques in Internet of Things (IoT). In Proceedings of the 2017 IEEE 15th Student Conference on Research and Development (SCOReD), Putrajaya, Malaysia, 13–14 December 2017; pp. 67–71. [Google Scholar]
- Atzori, L.; Iera, A.; Morabito, G. The internet of things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
- Farooqi, N.; Gutub, A.; Khozium, M.O. Smart community challenges: Enabling IoT/M2M technology case study. Life Sci. J. 2019, 16, 11–17. [Google Scholar]
- Gutub, A.; Al-Juaid, N.; Khan, E. Counting-based secret sharing technique for multimedia applications. Multimedia Tools Appl. 2019, 78, 5591–5619. [Google Scholar] [CrossRef]
- Al-Shaarani, F.; Gutubn, A. Securing matrix counting-based secret-sharing involving crypto steganography. J. King Saud-Univ.-Comput. Inf. Sci. 2022, 34, 6909–6924. [Google Scholar] [CrossRef]
- Kheshaifaty, N.; Gutub, A. Engineering graphical captcha and AES crypto hash functions for secure online authentication. J. Eng. Res. 2021. [Google Scholar] [CrossRef]
- Bhattacharyya, D.; Ranjan, R.; Alisherov, F.; Choi, M. Biometric authentication: A review. Int. J. u-and e-Serv. Sci. Technol. 2009, 2, 13–28. [Google Scholar]
- Ometov, A.; Bezzateev, S.; Mäkitalo, N.; Andreev, S.; Mikkonen, T.; Koucheryavy, Y. Multi-factor authentication: A survey. Cryptography 2018, 2, 1. [Google Scholar] [CrossRef] [Green Version]
- Kürtünlüoğlu, P.; Akdik, B.; Karaarslan, E. Security of virtual reality authentication methods in metaverse: An overview. arXiv 2022, arXiv:2209.06447. [Google Scholar]
- Sodhro, A.H.; Awad, A.I.; van de Beek, J.; Nikolakopoulos, G. Intelligent authentication of 5G healthcare devices: A survey. Internet Things 2022, 100610. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Maglaras, L.; Derhab, A. Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends. Secur. Commun. Netw. 2019, 2019, 5452870. [Google Scholar] [CrossRef] [Green Version]
- Puthal, D.; Mohanty, S.P. Proof of authentication: IoT-friendly blockchains. IEEE Potent. 2018, 38, 26–29. [Google Scholar] [CrossRef]
- El-Hajj, M.; Fadlallah, A.; Chamoun, M.; Serhrouchni, A. A survey of internet of things (IoT) authentication schemes. Sensors 2019, 19, 1141. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Zhang, J.; Wang, Z.; Yang, Z.; Zhang, Q. Proximity based IoT device authentication. In Proceedings of the IEEE INFOCOM 2017-IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar]
- Kihara, M.; Iriyama, S. New authentication algorithm based on verifiable encryption with digital identity. Cryptography 2019, 3, 19. [Google Scholar] [CrossRef]
- Kihara, M.; Iriyama, S. Security and performance of single sign-on based on one-time pad algorithm. Cryptography 2020, 4, 16. [Google Scholar] [CrossRef]
- Schnorr, C.P. Efficient identification and signatures for smart cards. In Advances in Cryptology—CRYPTO ’89, Proceedings of the Conference on the Theory and Application of Cryptology, Santa Barbara, CA, USA, 20–24 August 1989; Brassard, G., Ed.; Springer: New York, NY, USA, 1989; pp. 239–252. [Google Scholar]
- Bruno, B. (developper). ProVerif: Cryptographic protocol verifier in formal model. Available online: https://prosecco.gforge.inria.fr/personal/bblanche/proverif/ (accessed on 24 December 2022).
- Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999; Springer: Berlin/Heidelberg, Germany, 1999. [Google Scholar]
- Gentry, C. A fully Homomorphic Encryption Scheme; Stanford University: Stanford, CA, USA, 2009. [Google Scholar]
- Buchmann, J. Introduction to Cryptography; Springer: New York, NY, USA, 2004; Volume 335. [Google Scholar]
Combination of Ciphertexts | Calculation by Eve | Result |
---|---|---|
and | ||
and | ||
and | ||
All ciphertexts | 0 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kihara, M.; Iriyama, S. Security Verification of an Authentication Algorithm Based on Verifiable Encryption. Information 2023, 14, 126. https://doi.org/10.3390/info14020126
Kihara M, Iriyama S. Security Verification of an Authentication Algorithm Based on Verifiable Encryption. Information. 2023; 14(2):126. https://doi.org/10.3390/info14020126
Chicago/Turabian StyleKihara, Maki, and Satoshi Iriyama. 2023. "Security Verification of an Authentication Algorithm Based on Verifiable Encryption" Information 14, no. 2: 126. https://doi.org/10.3390/info14020126
APA StyleKihara, M., & Iriyama, S. (2023). Security Verification of an Authentication Algorithm Based on Verifiable Encryption. Information, 14(2), 126. https://doi.org/10.3390/info14020126