• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Remote Three-Factor Authentication Protocol with Strong Robustness for Multi-Server Environment

    2017-05-09 07:48:43MinZhangJiashuZhangWenrongTan
    China Communications 2017年6期

    Min Zhang, Jiashu Zhang, Wenrong Tan

    1 Sichuan Province Key Lab of Signal and Information Processing, Southwest JiaoTong University, Sichuan, 610031, China.

    2 School of Foreign Languages, Southwest Minzu University, Sichuan, 610041, China.

    3 School of Computer Science and Technology Southwest Minzu University, Sichuan, 610041 China

    I. INTRODUCTION

    In the single-server authentication environment, each user needs to register for every single server. Thus, one user must remember various passwords for different application servers. This case may bring a lot of inconvenience and new security threats. To solve these problems, many scholars began to pay attention to authentication schemes for multi-servers environment [1]-[8]. Most of these schemes are based on username/password or smart card along with various cryptographic algorithms, such as Elliptic Curve Cryptography or Bilinear Pairings [5-6], Chebyshev chaotic map [7-8]. However, compared with password and smart card, biometric keys have many advantages shown as follows [9]: 1) Biometric keys cannot be lost or forgotten; 2) Biometric keys are not easily to be shared or copied; 3)Biometric keys are difficult to be fabricated or distributed; 4) Biometric keys are difficult to be guessed. Due to the above advantages,the biometrics-based authentication scheme is more reliable than traditional password-based authentication scheme. However, if we only use biometrics for remote authentication, there will be some security risks as shown in literature [10].

    The secure biometric-based remote three-factor authentication with Chebyshev chaotic map and secure sketch scheme is proposed.

    In order to solve the problems in the authentication phase only based on biometrics,a lot of three-factor authentication schemes based on biometric, smart card and password have been proposed [11]-[21]. Lee et al. [11]proposed a three-factor authentication scheme based on fingerprint and smart card. However,Lin et al. [12] and Chang et al. [13] pointed out that Lee et al.’s scheme cannot resist the conspiring attack and masquerade attack. In order to overcome these problems, Kim et al.’s [14] proposed a new scheme. Scott [15]found that Kim’s scheme has some secure problems. In 2010, Li and Hwang [16] proposed a three-factor authentication scheme.However, Li et al.[17] pointed out that Li-Hwang’s scheme cannot resist man-in-themiddle and denial-of-service attacks. In 2013,Yoon and Yoo [18] proposed a new three-factor authentication scheme using elliptical curve cryptosystem (ECC). However, he [19]pointed out Yoon-Yoo’s scheme cannot resist privileged insider attack and impersonation attack. In 2014, He-Wang proposed a new three-factor authentication scheme based on ECC and smart cards [20]. However, Odelu et al. [21] pointed out that He-Wang’s scheme is vulnerable to known session-specific temporary information attack and impersonation attack in 2015. After analysis, we can see that Odelu et al.’s scheme has a lot of disadvantages such as: 1) The scheme may suffer Denial of Service (Dos) attack. 2) The scheme may suffer insider attack; 3) This scheme doesn’t have strong robustness. In order to solve these problems, a new three-factor authentication based on secure sketch and chebyshev chaotic map has been proposed in this paper.

    1.1 Our contributions

    Besides the contributions in Odelu-Das-Goswami’s scheme, other contributions in this paper are outlined as followings: 1) In order to prevent attacker to sponsor repeat registered attack, RC must maintain a data table for every registered user and application server.However, this case may lead to other security problems such as attacker or the administrator of RC can delete user’s information stored in data table and then register to RC by the victim’s identity. In our scheme, we introduce timestamp to perfectly solve this problem. 2)During the login and authentication phase, we can complete the authentication between the user and the application without the participation of the RC. This case can increase greatly the robustness of the whole system. 3) In order to solve the problem of fuzzy character of biometrics, we introduce the secure sketch scheme [22]. From the analysis, we can see that secure sketch scheme consume less computational work than fuzzy extractors scheme.

    1.2 The organization of the paper

    The remainder of this paper is organized as follows. The details of Odelu-Das-Goswami’s scheme are shown in references [21], we don’t give detailed introduce in this paper. In Sect.2 we show the weaknesses of the Odelu-Das-Goswami’s scheme. And the proposed scheme is presented in Sect.3. Then, we analyze the performance of this proposed scheme and show that the scheme can resist several attacks in Sect. 4. Our conclusion is given in Sect.5.

    II. WEAKNESSES OF THE ODELU-DASGOSWAMI’S SCHEME

    The details of Odelu-Das-Goswami’s scheme are shown in references [21]. We only show the weaknesses of Odelu-Das-Goswami’s scheme in this paper.

    2.1 This scheme may suffer Denial of service (Dos) attack

    During the registration phase of Odelu-Das-Goswami’s scheme, different people cannot use the same identity for registration because there is an identity-verifier tableτin RC. RC must check whether the hash valueH(IDi||k)matches with any existing entry inτ. However,this case may lead to (Denial of service) Dos attack if a large number of users using the same identity sponsor registration for RC at the same time.

    2.2 This scheme may suffer privilege attack

    Apart from external attacks, some true threats come from insider. In the Odelu-Das-Goswami’s scheme, the administrator of registration center (RC) can delete or modify data stored in identity-verifier table τ. For example, if the administrator knows a user identityIDihe/she can delete the datastored in tableτ. The attacker can useIDifor registration again and disguise as the victim whose identity is IDi.

    2.3 This scheme is not robust

    During the login and authentication phase of Odelu-Das-Goswami’s scheme, the RC must participate in the authentication processes in every login and authentication phase. However, the RC may work improperly because of some unpredictable reasons. This case may lead to the whole system cannot provide services. In order to solve this problem, RC should not participate in the login and authentication phase.

    2.4 User cannot freely select his/her identity

    There are some design flaws in Odelu-Das-Goswami’s scheme. For example, the user cannot select his/her identity randomly. This case not only lead to some inconveniences for users during the registration phase but also bring difficulties for users during the re-registration phase. According to the Odelu-Das-Goswami’s scheme, if a user wants to re-register for RC using the same identity, he/she must execute a complicated process.

    In order to solve these problems in Odelu-Das-Goswami’s scheme, we propose a new thee-factor based multi-server authentication protocol using Chebyshev chaotic map algorithm and secure sketch algorithm. Our scheme consists of the six phases, namely mathematical preliminaries phase, initialization phase, registration phase, login and authentication phase, password change phase,revocation and re-registration phase.

    III. THE PROPOSED SCHEME

    3.1 Mathematical preliminaries

    3.1.1 Chebyshev chaotic map[23]

    In order to better understand Chebyshev polynomial and chaotic maps, the definitions are shown as follows.

    Definition 1: The Chebyshev polynomial with semigroup feature can be defined on an intervaldefining

    Definition 2: [Chaotic map-based discrete logarithm problem] It is a hard problem to get S with the valueand

    Definition 3: [Chaotic map-based Diffe-Hellman problem] It is a hard problem to computeusingand x.

    3.1.2 Secure Sketch[22]

    As shown in figure 1, secure sketch algorithm consists of SS and Rec. During the registration phase, we can get S by inputtingfor SS algorithm. Then, we can recoverby inputting S andfor Rec algorithm in the login phase if the value ofBlogis close to

    3.2 The proposed scheme

    3.2.1 The Notations Used in the Proposed Scheme

    Please find the notations description in Table 1.

    3.2.2 Initialization phase

    Fig. 1 The secure sketch algorithm

    Table I Notations description

    Fig. 2 The application server registration phase of our scheme

    Table II Users’ information stored in RC

    The Register Center (RC) generates a long private key k (e.g. 2048 bits) and selects a seed x for generating Chebyshev Chaotic Map. Then,the register center publishesin public directory. RC must ensure the security of k.

    3.2.3 Registration Phase

    1)The application server registration phase(As shown in fig. 2)

    Step 1.The application serversends its identityand the current registration time to RC for registration via a secure channel;

    Step 2.After receivingfromthe RC checks whether the value ofexceeds the maximum range. RC cannot permit different users to select the same identity during the time intervalIf the result holds, the RC gets its private key k and acquires the private key ofby computingThen the RC acquires the public key ofby computingAt last, the RC sends S andtovia secure channel;

    Step 3.After receivingfrom the RC,must ensure that the value ofis treated with strictest confidentiality and then publishes his/her identitythe public keyregistration time

    2)The user registration phase (As shown in fig.3)

    Step 1. Firstly, the user selects his/her identitypasswordand extracts his/her biometricand the current time

    Step 2.According to the scheme of secure sketch, we can get the median valueif we inputfor thealgorithm. Smart card computesand sendsto RC for registration;

    Step 3.After receivingfrom user, RC checks the whether the value ofexceeds the maximum rangefor the RC cannot permit different users to select the same identity during the time intervalIf the result holds,RC gets the private key k of Sjand computes user’s private keyAt the same time, the RC computesa n d storesthe value ofand a large prime number P in smart card. The information of user stored in RC as shown in table 2.In our scheme, the information stored in table 2 would not be used until application server needs to confirm user’s identity.

    Step 4.After receiving smart card from RC, the user writesin smart card. All the information having been stored in smart card contains

    3.2.4 Login and authentication phase (as shown in fig.4)

    Step 1.Firstly, the user selects his /her identitypasswordand extracts his/her biometricAt the same time, user gets identityand public key,registration timeof the application server which he/she wants to visit.

    Step 2.According to the scheme of secure sketch, we can recover the value of user’s biometricin the registration phase by inputtingand

    Step 4.After receivingfrom the user, the application server checks the validity of.If the result holds, the application server getswith its private key s andThen,the application servergetsby computingand getsA t la s t,g e tsAt the same time,getsand comparesIf the result holds,we execute step 5.

    Step 5.The application servergenerates a random number b and computesandThencomputesandThen, the application server sendsto the user;

    Fig. 3 The user registration phase of our scheme

    Step 6.After receivingfrom the application server, the user computesusing the random number a. Then, the user computesand.At last, the user comparesIf the result holds, the user computesand sends it to the application server;

    Step 7.After receivingfrom user, the application server computesand comparesIf the result holds, the authentication progress is success and the session key between the user and the application server isand

    3.2.5 Password change phase

    Step 1.Firstly, the user selects his/her identitypasswordand extracts his/her biometric

    Step 2.According to the theory of secure sketch algorithm, we can recover the value of user’s biometricin the registration phase by inputtingand

    3.2.6 Revocation and re-registration phase

    If the user lost his/her smart card, he/she may want to register for RC with the same previous identity. In our scheme, the user can select the same identity to sponsor the registration phase without proving his/her passport or authorized identities. It provides a lot of convenience for users.

    IV. ANALYSIS OF THE PROPOSED SCHEME

    4.1 Security analysis

    4.1.1 Denial of service (Dos) attack

    During the registration phase in our scheme,RC needn’t to query database frequently because there is no data table in RC. Even a large number of users using the same identity to sponsor registration, the RC can also deal with it because the power of RC’s computation can overcome the computation work during the time interval

    Fig. 4 The login and authentication phase of our scheme

    4.1.2 Privileged insider attack

    In our scheme, we don’t need a data table in RC. So the administrator of RC cannot modify or delete any data about the user’s registration information. At the same time,a legal user sends his/her identityandto RC for registration instead of sendingandin plaintext. The administrator of RC cannot get any valuable information.

    4.1.3 The robustness of the scheme

    Compared with the Odelu-Das-Goswami’s scheme, our scheme doesn’t need the RC to participate in the login and authentication phase. This design can greatly improve the robustness of our scheme because improper work has slightest effect on the whole scheme.

    4.1.4 Whether the user can select his/her identity freely

    In order to overcome repeat registration attack, odelu et. al introduce data table to RC.However, it may bring new threats such as privileged insider attack. In our scheme, we introduce timestamp to solve this problem perfectly. User can select his/her identityrandomly while sending the current timeandto RC for registration. Then, RC firstly checks whether other user has been registered using the same identityduring the time intervalIf the result holds, RC computesas the user’s private key. Different users can select the same identity because the registration time is different.

    4.1.5 Smart card lost attack

    Through the power analysis attack [24],attacker can extract all the informationfrom smart card. However,due to the value of u is protected in the form ofSo the user cannot get user’s private keywithout the right bio-metric and password. Therefore, our scheme can resist smart card lost attack.

    4.1.6 Strong user anonymity

    During the login and authentication phase in our scheme, the identityof a legal user is protected in the form ofAn adversary cannot getbecause he/she cannot get the value of

    4.1.7 Mutual authentication

    During the login and authentication phase in our scheme, only a legal application server can compute the value ofwith its private key S. At the same time, only a legal user can compute the value ofwith its random number a and private key u.

    4.1.8 Perfect forward secrecy

    Forward attack secrecy defines that an adversary cannot compute the session key between user and application server even if the adversary gets all the secret keys of participants.In the proposed scheme, the session key isHowever,and a are both random numbers which are used only one time. As a result, our scheme can provide the prefect forward secrecy.

    4.1.9 Man-in-the-middle attack

    In the proposed scheme, an attacker may try to impersonate the user or the application server by intercepting message. However,is protected by hash function whileis protected by a random numberand hash function. From the analysis we can see that the attacker cannot get any valuable information from the transferred information via public channel. So our scheme can resist man-in-themiddle attack.

    4.1.10 Impersonation attack

    In the proposed scheme, the attacker cannot get user’s private key u without right password and biometrics. At the same time, the attacker cannot get any valuable information from the transferred information via public channel.Therefore, the attacker cannot sponsor impersonation attack.

    4.1.11 Whether consider the fuzzy of biometrics

    To many existing remote authentication schemes, hash function is a basic method to protect information security. However, the fundamental property of the hash function is that the output is very sensitive to their input even small perturbation. Generally speaking,the hash function cannot be input directly with biometric because of the fuzzy of biometric.In our scheme, we introduce secure sketch to solve these problems.

    4.1.12 Whether resist repeat registered attack

    In the proposed scheme, the user can select his/her identity randomly. So there is a case that different people may select the same identity. The attacker can get user’s private key by repeat registered attack. In order to solve this problem, some schemes introduce data table in RC. However, this case may bring other new problems such as privilege attack or user cannot re-register with previous identity. Our scheme can overcome this problem by timestamp.

    4.1.13 Whether the user select the identity freely

    In the proposed scheme, the user can select his/her identity randomly. Even the attacker select the same identity register for RC, he/she cannot get the victim’s private key because the time is different. So the user can select his/her identity freely in the proposed scheme.

    All the details about security properties are shown in table 3.

    C1: Dos Attack; C2: Privileged Insider Attack; C3: The Fuzzy of Biometrics; C4: Robustness; C5: Repeat Registered Attack; C6:Select The Identity Freely; C7: Smart Card Lost Attack; C8: User Anonymity; C9: Mutual Authentication; C10: Perfect Forward Secrecy; C11: Man-In-The-Middle Attack; C12:Impersonation Attack.

    Table III Comparison of security properties

    Table IV BAN logic notations

    4.2 BAN logic

    In this section, we adopt Burrows-Abadi-Needham (BAN) logic [25-26] to prove that the proposed scheme can achieve a session key between user and application server. The BAN logic notations are shown in table 4.

    ● BAN logical postulates

    ● Idealized scheme

    In order to conveniently describe, we denotesandthe proposed scheme can be idealized as follows.

    ● Establishment of security goals

    ● Initiative premises

    ● Scheme analysis

    From F1 and V1, we apply P2 and P4 rules to get

    G1. From V2 and F3, we apply P3 rule to get

    G2.From F5 and G1, we apply P3 rule to get

    G3.From V4 and F4, we apply P3 rule to get

    G4.From G3 and F6, we apply P5 rule to get

    From the analysis with BAN logic, we can be sure that the proposed scheme is securely achieving the goals.

    4.3 Formal security validation using proverif

    In this section, we prove the security of our proposed scheme using ProVerif which is automated formal tool [27]. ProVerif is based on applied calculus and can be used to verify authentication and secrecy properties [28]. There are three parts in the ProVerif: (1) declaration part; (2) process part; and (3) main part. We perform the ProVerif code in the online demo for ProVerif (http://proverif.rocq.inria.fr/index.php). The performance results as shown in the Fig 5. From the experimental results, we can see that our proposed scheme is security.

    4.4 Performance analysis

    4.4.1 Communication cost( As shown in table 5)

    S1: Server Registration Phase; U2: User Registration Phase; C3: Login And Authentication Phase; C4: Total

    We measure the consumption time Fuzzy Extractors algorithm, Secure Sketch algorithm, MD5 and DES algorithm on an Intel Core i5-3470 platform. The details are shown as follows.the time of executing an XOR operation;the time of executing MD5 operation;the time of executing a symmetric decryption/encryption operation;the time of secure sketch generatingfrom client’s biometric informationduring the registration phase;time of secure sketch recoveringfrom the sketchand the user login biometric informationthe time for obtaining help data P and secret key R from w by fuzzy extractors algorithm;the time for recovering R from w′ and for helping string P by fuzzy extractors algorithm;the time of executing the Chebyshev Chaotic polynomial mappingtime of an elliptic curve point multiplication.

    4.4.2 Computational cost

    The details about computational cost are shown in table 6 and table 7.

    V. CONCLUSION AND FUTURE WORKS

    In this paper, we have presented some flaws of the Odelu-Das-Goswami’s scheme. In order tosolve these problems, secure biometric-based remote three-factor authentication with Chebyshev chaotic map and secure sketch scheme has been proposed. From the analysis, we can see that the proposed scheme has higher security and deals with biometric more appropriately compared with Odelu-Das-Goswami’s scheme and other similar schemes. What’s more, the proposed scheme has less computation cost than Odelu-Das-Goswami’s scheme.At the same time, our scheme can achieve session key agreement and has stronger robustness than Odelu-Das-Goswami’s scheme also.

    Table V Comparison of performance

    Fig. 5 The user registration phase of our scheme

    Table VI Comparison of computational cost in the registration phase

    Table VII Comparison of computational cost in the login and authentication phase

    In the future, we will continue to further study three-factor schemes in multi-server environment. These schemes should become more reasonable and more effective compared with the proposed scheme in this paper. Moreover, we will build a biometric-based authentication tested and extend our scheme for body area network.

    ACKNOWLEDGEMENTS

    This work has been supported by Southwest University for Nationalities Foundation(No.2016NZYQN41), and by Key Technology Support Program of Sichuan Province(No.2014GZ0006), and by the Education Department of Sichuan Province (No.15ZB0489)and by Science and Technology Department in Sichuan province (No. 2017JY0230).

    [1] Wang B, Ma M. “A smart card based efficient and secured multi-server authentication scheme”. Wireless Personal Communications,vol.68, no. 2, pp. 361-378, 2013.

    [2] Li X, Xiong Y, Ma J, et al. “An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards”. Journal of Network and Computer Applications, vol. 35, no. 2, pp. 763-769, 2012.

    [3] Li X, Ma J, Wang W, et al. “A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments”.Mathematical and Computer Modelling, vol. 58,no. 1, pp. 85-95, 2013.

    [4] Yoon E J, Yoo K Y. “Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem”. The Journal of Supercomputing, vol.63, no. 1, pp 235-255, 2013.

    [5] Shen H, Gao C, He D, et al. “New biometrics-based authentication scheme for multi-server environment in critical systems[J].Journal of Ambient Intelligence and Humanized Computing”, vol. 6, no. 6, pp. 825-834, 2015.

    [6] Tsai J L, Lo N W. “A chaotic map‐based anonymous multi‐server authenticated key agreement protocol using smart card”. International Journal of Communication Systems, vol. 28, no.13, pp. 1955-1963, 2015.

    [7] Jiang P, Wen Q, Li W, et al. “An anonymous and efficient remote biometrics user authentication scheme in a multi server environment”. Frontiers of Computer Science, vol. 9, no. 1, pp. 142-156, 2015.

    [8] Zhu H. “A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-Server Environment”. TIIS, vol. 9, no. 2, pp 811-829, 2015.

    [9] Zhang M, Zhang J, Zhang Y. “Remote three‐factor authentication scheme based on Fuzzy extractors”. Security and Communication Networks, vol. 8, no. 4, pp. 682-693, 2015.

    [10] Uludag U, Jain A K. “Attacks on biometric systems: a case study in fingerprints”, Electronic Imaging 2004. International Society for Optics and Photonics, pp. 622-633, 2004;

    [11] J.-K. Lee, S.-R. Ryu, and K.-Y. Yoo, “Fingerprint-based remote user authentication scheme using smart cards,” Electron. Lett., vol. 38, no.12, pp. 554–555, 2002

    [12] C.-H. Lin and Y.-Y. Lai, “A flexible biometrics remote user authentication scheme,” Comput.Standards & Interfaces, vol. 27, no. 1, pp. 19–23,Nov. 2004.

    [13] C.-C. Chang and I.-C. Lin, “Remarks on fingerprint-based remote user authentication scheme using smart cards,” ACM SIGOPS Oper. Syst.Rev. vol. 38, no. 4, pp. 91–96, Oct. 2004.

    [14] H.-S. Kim, S.-W. Lee, and K.-Y. Yoo, “ID-based password authentication scheme using smart cards and fingerprints,” ACM SIGOPS Oper. Syst.Rev., vol. 37, no. 4, pp. 32–41, Oct. 2003.

    [15] M. Scott, “Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints,” ACM SIGOPS Oper. Syst.Rev.,vol. 38, no. 2, pp. 73–75, Apr. 2004.

    [16] C.-T. Li and M.-S. Hwang, “An efficient biometrics-based remote user authentication scheme using smart cards,” J. Netw. Comput. Appl., vol.33,no. 1, pp. 1–5, Jan. 2010.

    [17] X. Li, J. Niu, J. Ma, W. Wang, and C. Liu,“Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards,” J. Netw. Comput. Appl., vol.34, no. 1, pp. 73–79, Jan. 2011.

    [18] E. Yoon and K. Yoo, “Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem,” J. Supercomput., vol. 63, no. 1, pp.235–255, Jan. 2013.

    [19] D. He, Security flaws in a biometrics-based multi-server authentication with key agreement scheme, Tech. Rep. 2011/365, ePrint Archive. [On-line]. Available: http://eprint.iacr.org/2011/365.pdf.

    [20] He D, Wang D. Robust biometrics-based authentication scheme for multiserver environment[J]. Systems Journal, IEEE, vol. 9, no. 3, pp.816-823, 2015

    [21] Odelu V, Das A K, Goswami A. A secure biometrics-based multi-server authentication protocol using smart cards[J]. Information Forensics and Security, IEEE Transactions on, 2015, 10(9):1953-1966.

    [22] Dodis Y, Reyzin L, Smith A. Fuzzy extractors:How to generate strong keys from biometrics and other noisy data[C]//Advances in cryptology-Eurocrypt 2004. Springer Berlin Heidelberg,2004: 523-540.

    [23] Kocarev, Ljupco, and Shiguo Lian, eds.Chaos-based cryptography: Theory, algorithms and applications. Vol. 354. Springer, 2011.

    [24] T. S. Messerges, E. A. Dabbish, and R. H. Sloan,“Examining smart-card security under the threat of power analysis attacks,” IEEE Trans. Comput.,vol. 51, no. 5, pp. 541–552, May 2002.

    [25] Lu Y, Li L, Peng H, et al. “Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps”. Journal of medical systems, vol. 39, no. 6, pp. 1-10, 2015.

    [26] Burrow, M., Abadi, M., Needham, R., “A logic of authentication”.ACM Trans. Compu. Syst. vol. 8,pp. 18–36, 1990.

    [27] Blanchet B, Smyth B. ProVerif: Automatic Cryptographic Protocol Verifier User Manual & Tutorial (2011)[J]. URL http://scholar. google. com/scholar.

    [28] Chaudhry S A, Mahmood K, Naqvi H, et al. “An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography”.Journal of Medical Systems, vol. 39, no. 11, pp.1-12, 2015.

    [29] Irshad A, Sher M, Chaudhary S A, et al. “An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre”. The Journal of Supercomputing, vol. 72, no. 4, pp.1623-1644, 2016.

    [30] Chuang M C, Chen M C. “An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics”. Expert Systems with Applications, vol. 41, pp. 4, pp. 1411-1418, 2014.

    [31] Chaudhry S A, Farash M S, Naqvi H, et al. “An enhanced privacy preserving remote user authentication scheme with provable security”.Security and Communication Networks, vol. 8,pp. 18, pp. 3782-3795,2015..

    日韩国内少妇激情av| 亚洲精品成人久久久久久| 精品酒店卫生间| 免费人成在线观看视频色| 麻豆精品久久久久久蜜桃| 插阴视频在线观看视频| 日本av手机在线免费观看| 国产精品久久久久久精品电影| 国产免费福利视频在线观看| 91狼人影院| 大又大粗又爽又黄少妇毛片口| 精品99又大又爽又粗少妇毛片| 日韩一区二区三区影片| 水蜜桃什么品种好| 国产亚洲av嫩草精品影院| 99九九线精品视频在线观看视频| 欧美日韩在线观看h| 精品久久久久久久人妻蜜臀av| 欧美zozozo另类| 夫妻午夜视频| 热99在线观看视频| 亚洲国产精品sss在线观看| 精品不卡国产一区二区三区| 久久精品国产亚洲av涩爱| 国产一区有黄有色的免费视频 | 午夜激情久久久久久久| 亚洲成人精品中文字幕电影| av网站免费在线观看视频 | 91午夜精品亚洲一区二区三区| 在线a可以看的网站| 精品少妇黑人巨大在线播放| 午夜精品一区二区三区免费看| 秋霞在线观看毛片| 亚洲国产最新在线播放| 18禁在线播放成人免费| 国产欧美另类精品又又久久亚洲欧美| 久久久午夜欧美精品| 精品一区二区三区人妻视频| 欧美最新免费一区二区三区| 少妇的逼水好多| 十八禁国产超污无遮挡网站| 精品99又大又爽又粗少妇毛片| 男人狂女人下面高潮的视频| 亚洲精品第二区| 成年人午夜在线观看视频 | 国产视频内射| 国产人妻一区二区三区在| 欧美日韩国产mv在线观看视频 | 国产精品日韩av在线免费观看| av.在线天堂| 久久久久久久久久久免费av| 波多野结衣巨乳人妻| 日本一本二区三区精品| 中文字幕人妻熟人妻熟丝袜美| 午夜福利成人在线免费观看| 亚洲成人一二三区av| 老司机影院成人| 亚洲va在线va天堂va国产| 精品久久久久久久末码| 国产一区二区亚洲精品在线观看| 亚洲怡红院男人天堂| 亚洲真实伦在线观看| 国产永久视频网站| 国产成人精品久久久久久| 插逼视频在线观看| 人人妻人人澡人人爽人人夜夜 | 日韩人妻高清精品专区| 国产男女超爽视频在线观看| 国产黄片美女视频| 91狼人影院| 赤兔流量卡办理| 人人妻人人看人人澡| 久久精品熟女亚洲av麻豆精品 | 人妻制服诱惑在线中文字幕| 少妇高潮的动态图| 九草在线视频观看| 亚洲成色77777| 国产午夜福利久久久久久| 你懂的网址亚洲精品在线观看| 日韩欧美 国产精品| 91狼人影院| 少妇的逼水好多| 成年女人在线观看亚洲视频 | 午夜激情福利司机影院| 亚洲成人久久爱视频| 能在线免费观看的黄片| 亚洲成人久久爱视频| 日韩一区二区三区影片| 国产视频内射| 亚洲一区高清亚洲精品| 色视频www国产| 久久精品夜色国产| 99热全是精品| 国产一级毛片在线| 九九爱精品视频在线观看| 狠狠精品人妻久久久久久综合| 韩国高清视频一区二区三区| 如何舔出高潮| 免费黄网站久久成人精品| 精品99又大又爽又粗少妇毛片| 蜜桃久久精品国产亚洲av| 直男gayav资源| 国产色爽女视频免费观看| 国产淫语在线视频| 免费观看精品视频网站| av专区在线播放| 大又大粗又爽又黄少妇毛片口| 精品久久久噜噜| 午夜精品一区二区三区免费看| 大又大粗又爽又黄少妇毛片口| 免费少妇av软件| 久久久久久久亚洲中文字幕| videos熟女内射| 国产一区有黄有色的免费视频 | 欧美日韩综合久久久久久| 一级毛片黄色毛片免费观看视频| 成年女人看的毛片在线观看| 国产av码专区亚洲av| 久久久亚洲精品成人影院| 成人毛片a级毛片在线播放| 亚洲精品乱码久久久久久按摩| 国产爱豆传媒在线观看| 免费高清在线观看视频在线观看| 国产精品国产三级专区第一集| 97人妻精品一区二区三区麻豆| 精品人妻视频免费看| 日本午夜av视频| 国产黄色免费在线视频| 亚洲精品自拍成人| 亚洲熟女精品中文字幕| 亚洲欧美成人综合另类久久久| 日本午夜av视频| 99热网站在线观看| xxx大片免费视频| 免费av毛片视频| 美女国产视频在线观看| 男人舔女人下体高潮全视频| 亚洲怡红院男人天堂| 亚洲精品乱久久久久久| 久久久久久久久久黄片| 国产成人免费观看mmmm| 亚洲国产欧美在线一区| 亚洲内射少妇av| 一级片'在线观看视频| 神马国产精品三级电影在线观看| 国产真实伦视频高清在线观看| av网站免费在线观看视频 | 最近中文字幕2019免费版| 亚洲国产日韩欧美精品在线观看| 日韩视频在线欧美| av专区在线播放| 久久久久久久久中文| 亚洲性久久影院| 女人久久www免费人成看片| 欧美不卡视频在线免费观看| 在线a可以看的网站| 国产av码专区亚洲av| 两个人的视频大全免费| 男女边摸边吃奶| 亚洲av中文av极速乱| 男人舔奶头视频| 欧美bdsm另类| 国产精品久久久久久精品电影| 日韩制服骚丝袜av| 免费av毛片视频| 精品久久国产蜜桃| 一个人免费在线观看电影| 最近手机中文字幕大全| 国产片特级美女逼逼视频| 韩国高清视频一区二区三区| 久久精品国产亚洲av天美| 亚洲av成人精品一区久久| 日韩一区二区视频免费看| 一级毛片aaaaaa免费看小| 久久精品国产亚洲av涩爱| 国产精品综合久久久久久久免费| 亚洲真实伦在线观看| 国产精品无大码| 精品国产三级普通话版| xxx大片免费视频| 国产精品精品国产色婷婷| 在线观看免费高清a一片| 久久久久网色| 久久99热6这里只有精品| 午夜久久久久精精品| 国产午夜精品论理片| 日本-黄色视频高清免费观看| 国产三级在线视频| 搡女人真爽免费视频火全软件| 亚洲国产精品专区欧美| 丰满人妻一区二区三区视频av| 久久精品综合一区二区三区| 亚洲精品久久午夜乱码| 免费观看无遮挡的男女| 国内精品宾馆在线| 简卡轻食公司| 晚上一个人看的免费电影| 成年av动漫网址| 黄色欧美视频在线观看| 欧美潮喷喷水| 秋霞伦理黄片| 精品国内亚洲2022精品成人| 赤兔流量卡办理| 免费看光身美女| 欧美三级亚洲精品| 日本黄大片高清| 亚洲av中文av极速乱| 26uuu在线亚洲综合色| 国产黄a三级三级三级人| 久久97久久精品| 一个人观看的视频www高清免费观看| 成人av在线播放网站| 久久精品夜色国产| 欧美高清性xxxxhd video| 大又大粗又爽又黄少妇毛片口| 国产在线男女| 九草在线视频观看| 身体一侧抽搐| 看非洲黑人一级黄片| 亚州av有码| 欧美激情在线99| 国产淫片久久久久久久久| 久久精品国产亚洲网站| 狠狠精品人妻久久久久久综合| 午夜视频国产福利| 少妇熟女aⅴ在线视频| 国产爱豆传媒在线观看| 少妇丰满av| 国产国拍精品亚洲av在线观看| 欧美日韩视频高清一区二区三区二| 卡戴珊不雅视频在线播放| 一级黄片播放器| 老女人水多毛片| 中国美白少妇内射xxxbb| 国产有黄有色有爽视频| 亚洲欧美精品专区久久| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 在线播放无遮挡| 99视频精品全部免费 在线| 黄片无遮挡物在线观看| 亚州av有码| 亚洲精品久久午夜乱码| 午夜免费激情av| 久久精品久久久久久久性| 国产一区有黄有色的免费视频 | av网站免费在线观看视频 | av一本久久久久| 日韩欧美精品免费久久| 99热这里只有是精品在线观看| 久久久a久久爽久久v久久| 国产探花极品一区二区| av.在线天堂| 亚洲av成人精品一二三区| 久久久精品欧美日韩精品| 麻豆成人午夜福利视频| av在线老鸭窝| 夫妻性生交免费视频一级片| 欧美日韩在线观看h| 成人特级av手机在线观看| 美女cb高潮喷水在线观看| 熟妇人妻不卡中文字幕| 免费看不卡的av| 日韩人妻高清精品专区| 中文精品一卡2卡3卡4更新| 国产免费视频播放在线视频 | 99久久九九国产精品国产免费| 亚洲精品久久久久久婷婷小说| 国产成人福利小说| 禁无遮挡网站| 蜜桃久久精品国产亚洲av| 亚洲欧美成人精品一区二区| 日韩人妻高清精品专区| 丰满人妻一区二区三区视频av| 久久国内精品自在自线图片| 高清在线视频一区二区三区| 亚洲经典国产精华液单| 久久国产乱子免费精品| 亚洲最大成人av| 乱系列少妇在线播放| 精品久久久久久成人av| 欧美一级a爱片免费观看看| 精品酒店卫生间| 91av网一区二区| 国产精品爽爽va在线观看网站| 亚洲国产色片| 精品久久久噜噜| 国内少妇人妻偷人精品xxx网站| 精品一区二区免费观看| 一边亲一边摸免费视频| 国产成人a∨麻豆精品| 99热全是精品| 成人欧美大片| 99re6热这里在线精品视频| 久久99蜜桃精品久久| 国产亚洲最大av| 国产淫片久久久久久久久| av在线老鸭窝| 精品国产一区二区三区久久久樱花 | 午夜久久久久精精品| 大香蕉久久网| 亚洲自拍偷在线| 高清av免费在线| 禁无遮挡网站| 午夜久久久久精精品| av福利片在线观看| 中文欧美无线码| 最近视频中文字幕2019在线8| 能在线免费观看的黄片| 丝袜喷水一区| 亚洲电影在线观看av| 亚洲伊人久久精品综合| 两个人视频免费观看高清| 建设人人有责人人尽责人人享有的 | 欧美日韩国产mv在线观看视频 | 久久草成人影院| 极品少妇高潮喷水抽搐| 成年版毛片免费区| 国产不卡一卡二| 欧美一区二区亚洲| 国产乱来视频区| 久久久久久久久中文| 日韩一本色道免费dvd| 精品久久久久久电影网| 免费观看无遮挡的男女| 国产精品国产三级国产专区5o| 国产在线男女| 国产av在哪里看| 综合色av麻豆| 亚洲国产精品成人久久小说| 精品国内亚洲2022精品成人| 三级国产精品欧美在线观看| 国产精品三级大全| 国产淫片久久久久久久久| 午夜免费观看性视频| 久久精品人妻少妇| 久久久久久久午夜电影| 午夜激情欧美在线| 亚洲精华国产精华液的使用体验| 神马国产精品三级电影在线观看| 99九九线精品视频在线观看视频| 非洲黑人性xxxx精品又粗又长| 欧美潮喷喷水| 一级毛片黄色毛片免费观看视频| 国产一区亚洲一区在线观看| 少妇猛男粗大的猛烈进出视频 | 午夜福利视频精品| 色尼玛亚洲综合影院| 三级经典国产精品| 亚洲综合色惰| 亚洲国产最新在线播放| 免费黄频网站在线观看国产| 国内精品美女久久久久久| 亚洲欧洲日产国产| 日韩一区二区三区影片| 亚洲无线观看免费| 中文欧美无线码| 亚洲精品久久午夜乱码| 别揉我奶头 嗯啊视频| .国产精品久久| 色综合亚洲欧美另类图片| 亚洲婷婷狠狠爱综合网| 伊人久久国产一区二区| 国产不卡一卡二| 久久97久久精品| 国产久久久一区二区三区| 黄色一级大片看看| 亚洲国产av新网站| 一本久久精品| 美女被艹到高潮喷水动态| 午夜福利高清视频| 综合色丁香网| 欧美成人精品欧美一级黄| av在线亚洲专区| 少妇被粗大猛烈的视频| 在线观看免费高清a一片| videos熟女内射| 永久免费av网站大全| 成人漫画全彩无遮挡| 熟妇人妻不卡中文字幕| 全区人妻精品视频| 日韩欧美三级三区| 能在线免费观看的黄片| 人妻一区二区av| 亚洲美女视频黄频| av在线播放精品| 精品亚洲乱码少妇综合久久| 大话2 男鬼变身卡| 国产亚洲午夜精品一区二区久久 | 国语对白做爰xxxⅹ性视频网站| 亚洲在线观看片| 亚洲精品视频女| 激情 狠狠 欧美| 日本黄色片子视频| 亚洲av二区三区四区| 亚洲熟妇中文字幕五十中出| 国产中年淑女户外野战色| 国产精品99久久久久久久久| 在线观看一区二区三区| 性插视频无遮挡在线免费观看| 联通29元200g的流量卡| 91午夜精品亚洲一区二区三区| 深爱激情五月婷婷| 建设人人有责人人尽责人人享有的 | 99久久人妻综合| 国产黄色免费在线视频| 国语对白做爰xxxⅹ性视频网站| 精品人妻一区二区三区麻豆| 永久免费av网站大全| 国产精品女同一区二区软件| 直男gayav资源| 亚洲精品aⅴ在线观看| 亚洲最大成人av| 亚洲精品456在线播放app| 国产伦一二天堂av在线观看| 亚洲欧美成人综合另类久久久| 性插视频无遮挡在线免费观看| 国产综合懂色| freevideosex欧美| 好男人视频免费观看在线| 成人欧美大片| 亚洲av国产av综合av卡| 久久综合国产亚洲精品| 欧美日韩亚洲高清精品| 搞女人的毛片| 七月丁香在线播放| 久久久久性生活片| 黄色日韩在线| 国产黄a三级三级三级人| 成人鲁丝片一二三区免费| 亚洲欧美日韩东京热| 91av网一区二区| 最近手机中文字幕大全| 亚洲丝袜综合中文字幕| 亚洲精品自拍成人| 大片免费播放器 马上看| 欧美成人午夜免费资源| 肉色欧美久久久久久久蜜桃 | 美女主播在线视频| 男插女下体视频免费在线播放| 午夜精品一区二区三区免费看| 日产精品乱码卡一卡2卡三| av卡一久久| 日韩一区二区视频免费看| 国产有黄有色有爽视频| 成人国产麻豆网| 午夜福利视频1000在线观看| 晚上一个人看的免费电影| 三级男女做爰猛烈吃奶摸视频| 又粗又硬又长又爽又黄的视频| 少妇人妻精品综合一区二区| 不卡视频在线观看欧美| 亚州av有码| 青春草国产在线视频| 全区人妻精品视频| 国产综合精华液| 欧美 日韩 精品 国产| 午夜福利高清视频| 一夜夜www| 亚洲在线观看片| 街头女战士在线观看网站| 99re6热这里在线精品视频| av.在线天堂| 最近视频中文字幕2019在线8| 国产在线一区二区三区精| 午夜日本视频在线| 欧美一区二区亚洲| 男女那种视频在线观看| 久久久午夜欧美精品| 欧美成人a在线观看| 成人午夜精彩视频在线观看| 国产精品av视频在线免费观看| 成人性生交大片免费视频hd| 免费大片黄手机在线观看| 国产亚洲91精品色在线| 欧美 日韩 精品 国产| 亚洲av日韩在线播放| 免费观看性生交大片5| 国产免费又黄又爽又色| 少妇人妻一区二区三区视频| 国产精品嫩草影院av在线观看| 免费大片黄手机在线观看| 国产国拍精品亚洲av在线观看| 亚洲av电影不卡..在线观看| 天天躁夜夜躁狠狠久久av| 性插视频无遮挡在线免费观看| 全区人妻精品视频| 嫩草影院精品99| 中文字幕久久专区| 亚洲成人中文字幕在线播放| 人妻少妇偷人精品九色| 天天一区二区日本电影三级| 国产国拍精品亚洲av在线观看| 欧美 日韩 精品 国产| 国内精品美女久久久久久| 性插视频无遮挡在线免费观看| 国产伦理片在线播放av一区| www.色视频.com| 色视频www国产| 男的添女的下面高潮视频| 一个人观看的视频www高清免费观看| 日日摸夜夜添夜夜添av毛片| 亚洲自偷自拍三级| 亚洲久久久久久中文字幕| 亚洲自拍偷在线| 日韩亚洲欧美综合| 日韩国内少妇激情av| 亚洲av福利一区| 成人亚洲精品av一区二区| 色综合色国产| 欧美日韩精品成人综合77777| 成人漫画全彩无遮挡| 少妇人妻精品综合一区二区| 国产91av在线免费观看| 久久精品国产亚洲av天美| 国产一区有黄有色的免费视频 | 伦精品一区二区三区| 久久久久久久久大av| 男人狂女人下面高潮的视频| 纵有疾风起免费观看全集完整版 | 欧美高清性xxxxhd video| 人人妻人人澡欧美一区二区| 亚洲va在线va天堂va国产| 人妻制服诱惑在线中文字幕| 亚洲精品国产成人久久av| 中文字幕久久专区| 菩萨蛮人人尽说江南好唐韦庄| 久久久色成人| 免费观看在线日韩| 亚洲国产精品成人综合色| 精品久久久久久久人妻蜜臀av| 免费电影在线观看免费观看| 极品教师在线视频| 永久免费av网站大全| 午夜福利在线观看吧| 一个人看视频在线观看www免费| 国产一区二区亚洲精品在线观看| 天堂网av新在线| www.色视频.com| 久久精品久久久久久久性| 日韩一本色道免费dvd| 日本欧美国产在线视频| 女人久久www免费人成看片| 观看美女的网站| 日本熟妇午夜| 舔av片在线| 成人美女网站在线观看视频| 国产伦精品一区二区三区视频9| 麻豆精品久久久久久蜜桃| 麻豆久久精品国产亚洲av| 18禁裸乳无遮挡免费网站照片| 99re6热这里在线精品视频| 一级毛片电影观看| 免费观看精品视频网站| 丰满人妻一区二区三区视频av| 日本三级黄在线观看| 久久精品国产自在天天线| 国产中年淑女户外野战色| 欧美精品一区二区大全| 亚洲四区av| 欧美区成人在线视频| 男女视频在线观看网站免费| 国内精品一区二区在线观看| 狂野欧美激情性xxxx在线观看| 国产成人精品一,二区| 亚洲国产av新网站| 如何舔出高潮| 97人妻精品一区二区三区麻豆| 嘟嘟电影网在线观看| 国产黄色免费在线视频| 国产精品美女特级片免费视频播放器| 永久网站在线| 2021少妇久久久久久久久久久| av.在线天堂| 成人无遮挡网站| 少妇高潮的动态图| 欧美激情在线99| 99久久九九国产精品国产免费| 国产av国产精品国产| 九草在线视频观看| 久久99热这里只频精品6学生| 91精品一卡2卡3卡4卡| 深爱激情五月婷婷| 久久久欧美国产精品| 一级a做视频免费观看| 青春草视频在线免费观看| 777米奇影视久久| 国产 一区 欧美 日韩| 街头女战士在线观看网站| 男插女下体视频免费在线播放| av福利片在线观看| 午夜福利视频精品| 成年女人在线观看亚洲视频 | 两个人的视频大全免费| 久久久色成人| 国产高潮美女av| 水蜜桃什么品种好| 午夜福利在线在线| 国产精品美女特级片免费视频播放器| 男人舔奶头视频| 少妇熟女欧美另类| 神马国产精品三级电影在线观看| 国产人妻一区二区三区在| 午夜福利网站1000一区二区三区| 国产在视频线精品| 欧美日韩一区二区视频在线观看视频在线 | 又黄又爽又刺激的免费视频.| 日韩不卡一区二区三区视频在线| 熟妇人妻不卡中文字幕| 亚洲综合色惰| 精品久久久噜噜| 又粗又硬又长又爽又黄的视频| 成年女人在线观看亚洲视频 | 精品久久久久久久久av| 亚洲av中文字字幕乱码综合| 日韩成人av中文字幕在线观看|