An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing
Title | An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Sain, Mangal, Kim, Ki-Hwan, Kang, Young-Jin, lee, hoon jae |
Conference Name | 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) |
Date Published | Aug. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-1664-8 |
Keywords | authentication, CAPTCHA, captchas, Chen and Huang scheme, client-server internetworking systems, composability, cryptanalysis, cryptography, dynamic session key fur subsequent communication, enhanced user participating authenticating scheme, essential security services, Human Behavior, information leakage attack, middle attack, mutual authentication, password, pubcrawl, Servers, session key establishment, strong authentication scheme, two-factor user authentication framework, user anonymity, visual secret sharing, visualization |
Abstract | To prevent unauthorized access to adversaries, strong authentication scheme is a vital security requirement in client-server inter-networking systems. These schemes must verify the legitimacy of such users in real-time environments and establish a dynamic session key fur subsequent communication. Of late, T. H. Chen and J. C. Huang proposed a two-factor authentication framework claiming that the scheme is secure against most of the existing attacks. However we have shown that Chen and Huang scheme have many critical weaknesses in real-time environments. The scheme is prone to man in the middle attack and information leakage attack. Furthermore, the scheme does not provide two essential security services such user anonymity and session key establishment. In this paper, we present an enhanced user participating authenticating scheme which overcomes all the weaknesses of Chen et al.'s scheme and provide most of the essential security features. |
URL | https://ieeexplore.ieee.org/document/8919541 |
DOI | 10.1109/CSE/EUC.2019.00041 |
Citation Key | sain_improved_2019 |
- information leakage attack
- visualization
- visual secret sharing
- user anonymity
- two-factor user authentication framework
- strong authentication scheme
- session key establishment
- Servers
- pubcrawl
- password
- mutual authentication
- middle attack
- authentication
- Human behavior
- essential security services
- enhanced user participating authenticating scheme
- dynamic session key fur subsequent communication
- Cryptography
- cryptanalysis
- composability
- client-server internetworking systems
- Chen and Huang scheme
- captchas
- CAPTCHA