Abstract
With the development of wireless communication technology and the rapid increase of user data, multi-server key agreement authentication scheme has been widely used. In order to protect users’ privacy and legitimate rights, a two-factor multi-server authentication scheme based on device PUF and users’ biometrics is proposed. The users’ biometrics are combined with the physical characteristics of the Physically Unclonable Functions (PUF) as authentication factors, which not only ensures the security of the scheme, but it also is user-friendly without a password. The proposed scheme can be applied to telemedicine, smart home, Internet of Vehicles and other fields to achieve mutual authentication and key agreement between users and servers. In order to prove the security of the proposed scheme, the widely accepted ROR model and BAN logic are used for formal security analysis. The scheme can effectively resist various security attacks, and the comparison with existing schemes shows that it has better performance in terms of communication cost and computational complexity.
Keywords
Introduction
Related work
With the in-depth development of mobile network technology, all kinds of online services bring great convenience to people’s life. Online office, online teaching and remote medical treatment can be realized without leaving home. In the case of the COVID-19 outbreak in 2020, these services not only minimized the impact of the epidemic on people’s normal life, but also reduced face-to-face contact between people, which brought the epidemic under control quickly. In order to meet the needs of work and life, users and servers transmit information through a common channel to obtain various application services. Because public channels are open to all, these communications are vulnerable to be intercepted, wiretapped or modified by adversaries. In order to ensure the security of communication content between legitimate users and servers, the key agreement authentication scheme is proposed. The authentication scheme can ensure that only the communication parties can crack the messages encrypted by the session key. Even if the adversary obtains these messages, he can not know the real content of the communication between the two parties.
Since Lamport [1] proposed the first password-based key agreement authentication scheme in 1981, various single-server authentication schemes have been proposed successively. Most password-based authentication schemes require a password table to verify the validity of the user identity. However, protecting the security and integrity of password tables is a particularly difficult task. In addition, the password-based single factor authentication scheme can only realize one-way authentication between the server and the user, and the user cannot verify whether the server is legitimate, which leads to many network fraud events. ElGamal et al. [2] found that the existing password-based authentication schemes are difficult to resist the attack of replaying previously intercepted login requests and proposed an improved scheme, which is based on digital signature and does not need the system to maintain password files. Later, smart cards and biometrics were added to the authentication scheme [3–7] to further protect the security of users’ private data and the ability of the scheme to resist various security attacks.
With the rapidly increasing of Internet users and the diversification of network service resources, in order to achieve resource sharing and data communication in a secure way, the single-server user identity authentication schemes are unable to meet people’s needs, and the multi-server authentication scheme have been widely used [8–11]. The authentication schemes consist of three entities: user, server, and registration center (RC). After registering in the RC, users can access all registered servers.
Based on employed cryptographic mechanisms, the existing multi-server authentication schemes can be divided into the following six categories [12]: Finite Field Cryptography(FFC), Integer Factorization Cryptography(IFC), Chaotic-map-based cryptography, Elliptic Curve Cryptography(ECC), pairing-based cryptography and One-way hash and symmetric encryption. Except for the schemes based on one-way hash and symmetric encryption, other authentication schemes are based on the mathematical problems of asymmetric cryptography.
The authentication schemes based on FFC assume that the discrete logarithm problem(DLP) is difficult to solve. In 2013, Pippal et al. [13] proposed a multi-server authentication scheme based on smart card, which omitted the use of password table and allowed registered users to access the services provided by all authorized servers. Burrows-Abadi-Needham (BAN) logic was used for formal security analysis of the proposed scheme, so as to prove the security of their proposed scheme. Several researchers [14–17] have found that the scheme is difficult to resist offline password guessing attack, masquerading attack, privileged internal attack and other security defects, and put forward improved schemes for this scheme. However, [18] found that the improved scheme [16] still has security vulnerabilities such as denial of service attack, privileged insider attack and password guessing attack.
The security of authentication schemes based on integer factorization cryptography depends on the intractability of factoring a large integer. TsaurW et al. [19] proposed the first multi-server authentication scheme based on IFC. However, their scheme can only complete the mutual authentication between the user and the server, and cannot realize the key agreement. Since then, a large number of IFC-based authentication schemes [20–22] have been proposed.
Chaotic map-based conditional privacy- preserving authentication scheme is widely used in smart grid [23], healthcare telemedicine services [24], wireless sensor network [25], vehicle network and other fields [26]. The security of such schemes depends on the DLP and Diffie-hellman conundrum. Meshram et al. [27] proposed and promoted a multi-server authentication and key agreement protocol based on Mittag-Leffler-Chebyshev Summation Chaotic Map (MLCSCM). MLCSCM is used to replace the random number or time stamp in the traditional multi-server authentication scheme to realize the function of resisting replay attacks. Vivekanandan et al. [28] combined fuzzy extraction, elliptic curve encryption and chebyshev chaotic map techniques to propose a multi-server authentication scheme, which is applied to mobile cloud environment and includes three stages: registration stage, mutual authentication and key agreement stage and update stage.
The security of elliptic curve-based authentication schemes depends on the difficulty of solving elliptic curve DLP (ECDLP) and elliptic curve Diffie-hellman problem (ECDHP). Compared with FFC-based cryptosystem and IFC-based cryptosystem, elliptic curve cryptography(ECC) has more compact key length and more efficient operation [29–32], so it can save more storage space and have higher operation efficiency. The difficulty of solving Diffie-hellman problem on elliptic curve determines the security of pair-based cryptography schemes. Sengupta et al. [33] proposed a multi-server authentication scheme based on elliptic curve and bilinear pairing. In their scheme, user password and smart card update function are provided to solve the security problems caused by password leakage or smartcard loss of user privacy data.
In terms of computing speed and complexity, hash function is more advantageous than ECC, dot product operation, bilinear pairing operation, RSA encryption and decryption operation, chaotic mapping and other methods [34, 35]. Kumar-Om [36] proposed a hash-based multi-server key agreement authentication scheme and claimed that this scheme can resist all well-known security attacks. Haq et al. [37] found that Kumar-Om’s scheme had incorrect login stage, and can’t resist tracking attack, the session-specific temporary information attack and key compromise impersonation attack, and put forward an improved scheme. However, we find that the scheme of Haq et al. is still not resistant to server simulation attack, session key attack and offline identity guessing attack when a server is leaked. To solve this problem, we propose a further improvement scheme. In the improved scheme, the key compromise impersonation attack is solved. Meanwhile, the uniqueness of user’s biological characteristics is combined with the physical uniqueness of device PUF, which enhances the security of the scheme and facilitates user’s use without password. Both formal and non-formal methods are used to prove that the proposed scheme has good performance in security and computational complexity.
The rest of the paper are organized as follows. In the second section, we briefly introduce fuzzy extractor, one-way hash function and physical unclonable function. The third and fourth sections briefly review and analyze the safety of Haq scheme. The fifth section describes our scheme in detail. In sixth section, the formal and informal security analysis of our scheme is carried out. The seventh section compares the security and cost of the proposed scheme with some existing schemes. The eighth section summarizes the whole paper. The Figs. 1 and 2 shows the proposed system model and system flow chart in multi-server environment.

System model.

System flow chart.
All users and servers are untrusted. The RC is completely trusted, and the keys stored in the RC are secure over the long term. All cryptographic primitives used are secure. The channels used to transmit user and server information is open to adversaries, who can modify, store, delete, and retransmit all information on the channel. Adversaries can steal the smart cards of legitimate users and obtain useful information stored on the smart cards by launching side-channel attack. Users and servers that have registered with RC can impersonate adversaries. An adversary can launch an attack by combining the information intercepted from the channel with the information stolen from the smart card.
Contributions
We briefly summarize the scheme proposed by Haq et al. [37], and find that their scheme is still unable to resist key compromise impersonation attack, and analyze the reasons for the defects of Haq’s scheme. An improvement of Haq’s scheme is proposed, which can effectively solve the security defects of their scheme. A password-free scheme is proposed. In this scheme the user’s biometric key K
u
is used as the challenge of the device PUF, and the uniqueness of the user is combined with the uniqueness of the physical device to make the scheme have higher security. The proposed scheme is convenient for users and saves the storage space of the server. The widely accepted BAN logic and ROR are used to formally prove the security of the proposed protocol. At the same time, the informal analysis proves that the proposed protocol is secure. The proposed protocol is compared with some multi-service authentication schemes in terms of computational complexity, communication overhead and security, which proves that the proposed scheme is lightweight and secure.
Preliminaries
Fuzzy extractor
Due to the influence of angle, age, stains and other factors, there are differences between the feature templates obtained by a certain feature of the same user. If the difference is within the given hamming distance threshold, the two biometric templates are taken as input and the same biometric key can be obtained by using a fuzzy extractor [38]. The fuzzy extractor consists of two parts: Gen and Rep, in which Gen is a probabilistic function and Rep is a deterministic function.
Gen: Defined as (K, hd) ← Gen(B). The meaning of these symbols are as follows: B represents the binary string generated by the user’s biometrics. K is the generated biometric key, which is classified and does not need to be saved. hd stands for auxiliary data, which is public and used to assist in generating biometric key K during user authentication.
Rep: Defined as (K) ← Rep(B’, hd). When the difference between the biometric string B’ given when user authentication and the biometric string B at the time of registration is within a given Hamming distance threshold, the biometric key K can be restored with the help of auxiliary data hd.
One-way hash function
The binary string of arbitrary length generated by the user’s biometric template is input into the one-way hash function H(·), and the length of the output binary string is fixed. If one bit of the input string changes, the output string will change completely. In addition, the one-way hash function also has the following features: Preimage resistance: Input the arbitrary length string m into the one-way hash function H(·) to obtain a uniform random string n of fixed length, that is, H(m)=n. Even if H(·) and n are known, it is not feasible to calculate m. Weakly collision resistance: Given the string m, it is computationally infeasible to find another unequal string M’ satisfying H(m)=H(M’). Strong collision resistance: It is computationally infeasible to find two unequal strings M1 and M2, which satisfy the condition H(M1)=H(M2).
Physical Unclonable Function (PUF)
PUF can be defined as the unique and non-reproducible physical characteristics generated by the influence of temperature, voltage, electromagnetic interference and other factors in the manufacturing process of integrated circuits [39]. In the Challenge/ Response Mechanism, the same challenge input into different PUF will produce different responses. Different challenge inputs into the same PUF will produce different responses. The same response will be generated if the challenges and PUF used are the same twice. This physical property is irreversible, so the challenge cannot be obtained inversely from the response, which is difficult to be simulated by mathematical function. Therefore, PUF is often regarded as a one-way physical function [40], which is widely used in key generation, identification and authentication.
Besides, the symbols commonly used in the rest of the paper are given in Table 1.
Notations
Notations
The application server registration phase, user registration phase, login and mutual authentication phase, Password & biometric change phase in Haq [37] scheme are described as follows:
Application server registration phase
The application server S j sends a registration request to the RC through a secure channel. RC randomly selects a unique identity SID j for S j , and computes secret key h(SID j ||Q) by using RC’s private key, and sends {h(SID j ||Q),h(Q)} to S j . Finally, S j safely stores the received values.
User registration stage
U i selects ID i , a i and PW i as his unique identity, random number and password, inputs his biometric template bio i into the generation function of the fuzzy extractor and calculates Gen(Bio i )=(pr i , pu i ) to obtain the key pu i , then computes MPW i = h(PW i ||pr i ) and MID i = h(ID i ||a i ). Subsequently, U i sends the registration request containing {MPW i ,MID i } to RC through secure channel. RC first calculates X i = h(MID i ||Q), Y i = X i ⊕MPW i ⊕MID i , V i = h(Q)⊕ h(X i ) and Z i = h(X i ||h(Q)), then gets the values of A ij = h(h(SID j || Q)||MID i ) and E ij = A ij ⊕X i for each registered server. Next, RC stores {Y i , Z i ,V i ,(SID j , E ij )|1≤j≤n} in the smart card SC i and sends it to U i . Finally, U i calculates R i = MPW i ⊕a i , and stores {R i , pu i } in SC i .
Login phase
U i inserts SC i into the terminal and provides his credentials {ID i *, PW i *,Bio i *}. Firstly, SC i calculates pr i *=Rep(Bio i *,pu i ), MPW i *=h(PW i *|| pr i *), a i *=R i ⊕MPW i , MID i *=h(ID i ||a i ), X i =MPW i *⊕Y i ⊕ MID i *, h(Q)=h(X i *)⊕V i and Z i *=h(X i *||h(Q)). Then SC i compares whether the calculated Z i * and the stored Z i are equal. If not, SC i will reject the user U i . Otherwise, SC i calculates A ij *=E ij ⊕X i *, W i = h(A ij *||β i ), N i = W i ⊕α i , CID i = MID i *⊕β i ⊕h(Q) and M1 = h(MID i *||β i ||α i ), where α i , β i is two random numbers. Finally, U i sends the login request {CID i , N i ,M1,β i } to S j over a common channel.
Mutual authentication & key agreement phase
S j computes MID i *=CID i ⊕h(Q)⊕β i , W i = h(h(h(SID j ||Q)||MID i *)||β i ), α i * =W i *⊕N i and M1*=h (MID i * ||β i ||α i * ), eventually gets the M1*. Then it compares M1* and M1. If they are not equal, S j terminates the session. Otherwise, S j generates a random number α j and calculates Ns j =α j ⊕W i *, session key SK ij = h(MID i *||SID j || α i *||α j ||h(h(SID j ||Q)||MID i *)) and M2 = h(α i *||α j || SK ij ). Next, {Ns j ,M2} is sent by S j to U i through a common channel. U i calculates α j *=Ns j ⊕W i and SK ij = h(MID i ||SID j ||α i ||α j *||A ij *), and then he checks whether h(α i ||α j *||SK ij ) and received M2 are equal. If they are equal, U i will believe that S j is credible. Finally, U i takes the calculated M3 = h(SK ij ||α j *||α i ) sent to S j via common channel. After receiving the information sent by U i , S j calculates M3*=h(SK ij ||α j ||α i * ). S j compares M3* with M3, if they satisfy the requirements of equality, S j believes that U i is legal. U i and S j successfully established session key SK ij .
Cryptographic analysis of Haq scheme
When the keys h(Q) and h(SID j c ||Q) stored in server S j c are unfortunately leaked, the Haq scheme may suffer the following attacks:
Server impersonation attack
In order to disguise as server S
k
, the adversary needs to know the long-term secret value A
ik
between U
i
and S
k
. A
ik
is related to the user’s MID
i
, the server’s SID
k
and RC’s private key Q. It is difficult for an adversary to obtain the private key Q of the RC, therefore the adversary cannot obtain A
ik
through calculate directly. But the adversary can obtain h(Q) and h(SID
j
c
||Q) from the compromised server S
j
c
. The adversary steals U
i
’s smart card and uses side-channel attack technology to extract all information {Y
i
,Z
i
,V
i
,R
i
, pu
i
,(SID
i
,E
ij
)|1≤j≤n} stored in it. In addition, the adversary can eavesdrop a login message {CID
i
,N
i
,M1,β
i
} of U
i
to any application server. Then,the adversary can obtain the X
i
value of the U
i
by the following calculation:
The private key Q of RC is the same for all servers and users. Therefore, for different servers, the private key X i = h(MID i ||Q) of the same user U i is same.After calculating the private key X i of user U i , the adversary can use the information {(SID i ,E ij )|1≤j≤n} stolen from the smart card to calculate the shared secret value A ik = X i ⊕E ik between U i and any other servers S k (k≠j|1≤j≤n). Therefore, an adversary can impersonate S k to communicate with U i .
Session key attack
From the analysis of 4.1, we can know that when the keys h(Q) and h(SID j c ||Q) stored in the S j c are leaked, the adversary can calculate U i ’s pseudo identity MID i and the shared secret value A ik between U i and another servers S k . The adversary intercepts the interaction information {CID i , Nu i , M1, β i } and {Ns j , M2} between U i and S k , and computes α i =h(A ij ||β i )⊕Nu i and α k =Ns j ⊕h(A ik ||β i ). Finally, the adversary can obtain the session key SK ik = h(MID i ||SID k ||α i ||α k *||A ik *) between U i and S k .
Offline identity guess attack
Although Haq et al. [37] claimed that their scheme has strong user anonymity, we found that their scheme is difficult to resist offline identity guessing attack after the key of a certain server is leaked. According to the scheme of Haq et al. [26], the adversary can’t know the identity ID
i
of U
i
. Because only MID
i
= h(ID
i
||a
i
) is related to ID
i
and the one-way hash function is irreversible, it is impossible for an adversary to obtain ID
i
from MID
i
through inverse hash operation. On the basis of the analysis of 4.1 and 4.2, the adversary can use the stolen values to obtain {MID
i
,A
ij
,E
ij
,Y
i
,R
i
} through calculation. Using these values can calculate MPW
i
= MID
i
⊕A
ij
⊕E
ij
⊕Y
i
, the adversary can obtain the pseudo-password MPW
i
of U
i
. In addition, the value of a
i
can be obtained by calculating a
i
= MPW
i
⊕R
i
. The adversary selects an ID
i
* from the identity dictionary, calculates MID
i
*=h(ID
i
*||a
i
), and then compares whether MID
i
* and MID
i
are equal. If they are equal, the user identity ID
i
can be known. Otherwise, repeat this step.
Based on the above analysis, we can know the reason why Haq [37] scheme cannot resist the key compromise impersonation attack is that the hash value h(Q) of RC’s private key saved by all servers is same. Moreover, the private keys of the U i to different servers is the same X i . The adversary uses the information {h(SID j ||Q),h(Q)} leaked by a server can infer the private key X i of user U i . Because { (SID i ,E ij )|1≤j≤n}is stored in the smart card. Once an adversary gets the smart card, he can use the X i and (SID i , E ij |1≤j≤n) to get shared key A ij between U i and other servers. Adversary can use the A ij to launch server impersonation attack, session key attack and offline identity guessing attack.
The proposed scheme
Server registration phase
At this stage, in order to become an authorized service provider, S j sends a registration request containing a unique identity SID j to RC(registration center). RC calculates Ks j = h(SID j ||P2), K =h(P1||P2) and h(P2), where P1 and P2 are the private keys of RC. Then, RC sends Ks j , K and h(P2) to S j . Upon receiving the message, S j securely stores {Ks j , K, h(P2)}. At this stage all information is transmitted over a secure channel. Figure 3 shows the detailed process of server registration.

Server registration process.
When U
i
registers with RC, who needs to provide his unique identity ID
i
and biometric template Bio
i
. U
i
encrypts the above information by using PUF embedded in the intelligent terminal SD
i
, fuzzy extractor and one-way hash function, and then sends the encrypted identity MID
i
and pseudo-password MPW
i
to RC through a secure channel. RC sends the information needed by U
i
, which lays the foundation for subsequent mutual authentication between U
i
and S
j
. Afterwards, U
i
stores the received information in SD
i
and remote database RD. Figure 4 shows the process of user registration. The specific process is as follows: U
i
selects the unique identity ID
i
and gets the biometric template Bio
i
by using the Biometric extractor. Then U
i
uses the generating function of the fuzzy extractor to calculate (K
u
,hd)=FE.Gen(Bio
i
),and obtains the user’s biometric key K
u
and auxiliary information hd. Among them, K
u
is unique and can only be generated by Bio
i
. After that, Ku
i
is used as the challenge of the device PUF
i
to obtain the response value a
i
, that is, a
i
= PUF
i
(Ku
i
). By doing so, the uniqueness of the user’s biometrics is perfectly combined with the physical uniqueness of the device PUF
i
. Lastly, U
i
calculates the pseudo-password MPW
i
= h(Ku
i
||a
i
) and anonymous identity MID
i
= h(ID
i
|| a
i
), and sends them to RC through a secure channel. After receiving MPW
i
and MID
i
, RC generates a random number b
i
. Then RC calculates U
i
’s private key X
i
= h(MIDi||P1), KX
i
= h(X
i
||b
i
), Y
i
= KX
i
⊕MPW
i
, V
i
= h(KX
i
)⊕h(P2), A
i
= h(K||b
i
|| MID
i
), E
i
= A
i
⊕KX
i
, Z
i
= h(KX
i
||h(P2)|| MID
i
) and F
ij
= b
i
⊕h(SID
j
||P2)(1≤j≤n). Finally, RC sends {Y
i
,V
i
,Z
i
, E
i
,(SID
j
, F
ij
|1≤j≤n)} to U
i
through a secure channel. U
i
stores{Y
i
,V
i
,Z
i
,E
i
,hd
i
} in SD
i
. By computing Vb
ij
= h(Ku
i
)⊕F
ij
for every server, U
i
encrypts the sensitive data F
ij
with h(Ku
i
) and stores {SID
j
,Vb
ij
| 1≤j≤n} in RD. Even if the data {SID
j
,Vb
ij
| 1≤j≤n} in RD is compromised, without user’s biometric key h(Ku
i
), F
ij
is not advisable to adversary.

User registration proces.
Figure 5 shows the login and mutual authentication process, which proceeds according to the following steps: When the U
i
wants to obtain services from the authorized server S
j
, he needs to input the certificate {ID
i
, Bio
i
*} used during registration. U
i
takes the auxiliary information hd
i
stored in SD
i
as the input of the Rep function to calculate the biometric key K
u
*, namely, K
u
*=FE.Rep(Bio
i
*,hd
i
). Then U
i
takes the obtained K
u
* as the challenge of PUF
i
in the intelligent terminal SD
i
to obtain the response a
i
*, that is, a
i
*=PUF
i
(Ku
i
*). Subsequently, U
i
gets Vb
ij
from RD and computes MPW
i
* =h(Ku
i
*||a
i
*), MID
i
* =h(ID
i
||a
i
*), F
ij
*=Vb
ij
⊕h(Ku
i
*), KX
i
* =Y
i
⊕ MPW
i
*, h(P2)*=V
i
⊕h(KX
i
*) and Z
i
*=h(KX
i
*|| h(P2)*||MID
i
*), and contrasts Z
i
* with Z
i
generated in the registration phase. If they are not equal, SD
i
terminates the conversation. In the opposite situation, U
i
continues with the following operations. In our scheme, Ku
i
* can only be obtained from the biological characteristics of U
i
. In addition, the uniqueness of user’s biometrics is combined with the physical uniqueness of PUF
i
, the response obtained by inputting Ku
i
* into different PUF is different. Only by inputting Ku
i
* into PUF
i
(embedded in SD
i
), U
i
can get a
i
*. When the user’s biometrics are leaked, without PUF
i
, even if the adversary obtains Ku
i
* he cannot obtain a
i
*. Similarly, if an adversary steals PUF
i
, it is not feasible to calculate a
i
* without Ku
i
*. Although no password is used, the combination of biometrics and device PUF can ensure the sufficient security of the scheme. U
i
selects two random numbers σ
i
and β
i
, then calculates A
i
= E
i
⊕KX
i
*, W
i
=β
i
⊕h(P2)*, Nu
i
= h(A
i
)⊕σ
i
, CID
i
= F
ij
*⊕β
i
, P
i
= MID
i
⊕β
i
and M1 = h(MID
i
*||σ
i
||β
i
|| h(P2)*). Finally, {CID
i
, Nu
i
, M1, P
i
, W
i
} are sent to S
j
through the common channel. Login and mutual authentication process.

After receiving the login message sent by U
i
, S
j
first calculates β
i
*=W
i
⊕h(P2) and the encrypted identity MID
i
* =P
i
⊕β
i
* of U
i
, and gets M1* through a series of calculations b
i
*=CID
i
⊕Ks
j
⊕β
i
*, A
i
*=h(K||b
i
||MID
i
*), σ
i
*=Nu
i
⊕h(A
i
*) and M1*=h(MID
i
*||σ
i
*||β
i
*||h(P2)), and compares whether the calculated M1* and the received M1 are equal. If they meet equal requirements, S
j
believes that U
i
is a legitimate user and generates numbers δ
j
randomly. Finally, S
j
computes Ns
j
=δ
j
⊕h(A
i
*) and M2 =h (σ
i
*||δ
j
||A
i
*), and sends them to U
i
U
i
computes δ
j
*=Ns
j
⊕h(A
i
) and M2*=h(σ
i
||δ
j
*||A
i
)) by using the received {Ns
j
,M2}. Then U
i
compares whether the calculated M2* and the received M2 are equal. If not, he terminates the session. If M2* equals M2, S
j
succeeds in authentication at U
i
, U
i
calculates the session key SK
ij
= h(MID
i
*||SID
j
||σ
i
|| δ
j
*||A
i
) and M3 = h(SK
ij
|| δ
j
*||σ
i
). Finally, M3 is sent to S
j
. Firstly, S
j
calculates session key SK
ij
= h(MID
i
*||SID
j
||σ
i
*||δ
j
||A
i
*) and M3*=h(SK
ij
|| δ
j
*||σ
i
). Subsequently he compares whether M3* and M3 are equal. If they are equal, U
i
and S
j
successfully establish the session key SK
ij
. Subsequent sessions of U
i
and S
j
will be encrypted with the negotiated session key SK
ij
.
Security analysis
Informal security analysis
Key compromise impersonation attack resistance
We assume that A has compromised server S j c . As a result, A can steal {Ks j c , K c , h(P2) c } from S j c . Based on 4.1, we can know that Haq et al.’s [33] can not resist key compromise impersonation attack. However, our scheme can ensure that A can not launch an impersonation attack or get the session key of other participants even if the keys of S j c are compromised:
(1) Server impersonation attack resistance
The values of {K, h(P2)} is common in all application servers, but every server has different Ks. According to the proposed scheme we can know that Ks
k
=h(SID
k
||P2). Because P2 is RC’s private key, which is not available to him,
(2) User impersonation attack resistance
In order to fabricate the legitimate user U k , the adversary needs to know A k . On the one hand, an adversary needs to calculate h(K||b k ||MID k ) to get the value of A k . As can be seen from the proposed scheme, b is different for different users. The adversary cannot obtain b k , so this method is not effective. On the other hand, according to Nu k = h(A k )⊕σ k , thus the adversary needs to know Nu k . We know that the channel is open to adversaries, who can steal any message transmitted on the channel. We suppose the adversary intercepts the login message {CID k ,Nu k ,M1,P k ,W k } of user U k , because certification σ k is different in each session, it is impossible for the adversary to get the h(A k ). Even if the adversary obtains the h(A k ) in some way, it cannot obtain A k because of the unidirectionality of the hash function. Therefore, in the case of key disclosure, the adversary cannot forge any legitimate user.
(3) Session key security
According to the proposed scheme, session key SK ij = h(MID i ||SID j ||σ i ||δ j ||A i ). To calculate the session key SK ij , an adversary needs to know MID i , SID j , σ i , δ j and A i . And σ i =Nu i ⊕h(A i ), δ j =Ns j ⊕h(A i ), A i = h(K||b i ||MID i ). Assume that the adversary intercepts all the messages {CID i , Nu i , M1, W i , P i }, {Ns j , M2}, {M3} on the channel during user login and authentication. According to 6.1.1 (2), even if server S j c is leaked, the adversary cannot steal the A i value of legitimate user U i , so the session key SK ij established by legitimate user U i and server S j is secure.
User anonymity and untraceability
In our scheme, the user’s identity ID i is encrypted by the secret value a i to generate the user’s anonymous identity MID i . According to the irreversibility of one-way hash function and MID i = h(ID i ||a i ), ID i cannot be obtained even if MID i is known. In the login phase, U i generates different σ i and β i during each session, and CID i , Nu i , M1 are related to them, so the same user sends different {CID i , Nu i , M1, W i ,P i } to the same server each time. The adversary cannot track the user’s behavior with the help of multiple intercepted messages {CID i , Nu i , M1, W i ,P i }. In conclusion the proposed protocol can ensure user anonymity and resist user tracing attack.
Replay attack resistance
In the proposed scheme, a new random number is used for each session message to prevent replay attack. The adversary resends the message {CID i , Nu i , M1, W i ,P i } intercepted from the public channel to pretend to be a legitimate user U i and establishs a connection with S j . First, S j will continue to execute according to the normal process and send {Ns j ,M2} to the adversary, but without the correct A i , the adversary cannot calculate the correct M3. The server S j will directly terminate this session when discovery that M3 is not equal to h(SK ij ||δ j *||σ i ). Similarly, the adversary resends {Ns j , M2} or {M3} will cause the mutual authentication be suspended. In addition, because the valid message contains the biometric key K u , it is difficult for the adversary to get K u and construct a new message. So, the replay attack will not work.
Mutual authentication
For both sides of communication, mutual authentication is required. Only by ensuring that the entity communicating with them is legal can the session key be established. In our schemes, the legitimacy of server and user identity are verified by comparing the equality relation between M2 and h(σ i ||δ j *||A i *) and between M3 and h(SK ij ||δ j *||σ i ). Therefore, our scheme provides the function of mutual authentication between communication parties.
Stolen smart card attack resistance
Assume that the adversary stoles the information {Y i ,V i ,Z i ,E i ,hd i } stored by the legitimate user in the smart terminal SD i . Among them,V i =h(KX i )⊕h(P2), A i = h(K||b i ||MID i ), E i = A i ⊕KX i and Z i = h(KX i ||h(P2)||MID i ). The adversary cannot use the obtained parameters to calculate the user’s identity ID i and biometric key K u . Therefore, our scheme can resist smart card attacks.
Offline password guessing attack resistance
If the user’s password is too short, the security is poor and it is easy to be guessed by the adversary. On the contrary, if it is too long, it is not convenient for users to remember. In addition, in a multi-server authentication scheme that contains passwords, storing passwords takes up storage space of the server. Our scheme does not need a password, which is not only convenient for users, but also saves the storage space of the server. Because no password is required in this scheme, it can resist password guessing attack.
Privileged-insider attack resistance
At the user registration stage MPW i = h(Ku i ||a i ) and MID i = h(ID i || a i ), the user biometric key K u and identity identifier ID i are encrypted with hash and hidden in MPW i and MID i , and they are sent to the registration center RC. a i is the response obtained by inputting the user’s biometric key K u into the device PUF. The adversary cannot obtain K u and PUF at the same time, so a i cannot be obtained. Even a i is known, because the one-way hash function is irreversible, insiders cannot calculate K u and ID i values in polynomial time to forge the legitimate user U i .
Perfect forward secrecy
At each session, user and server randomly select σ i and δ j to establish session secret key SK ij = h(MID i *||SID j ||σ i ||δ j *||A i *), therefore, σ i and δ j values in all session keys are different. When a session key SK ij c is leaked, the adversary cannot obtain the values of σ k and δ k about other session keys and cannot obtain the session key SK km . It can be seen that our proposed scheme has perfect forward secrecy.
Denial-of-service attack resistance
In the user login phase, the smart terminal SD i calculates Z i * according to the biometric template Bio i and identifier ID i provided by the user, and then verifies whether Z i * is equal to the stored Z i . When Z i * differs from Z i , the SD i discards the user’s login request. So, there is no risk of denial of service attack in our scheme.
Formal analysis
Formal Security Analysis Using Burrows-Abadi-Needham (BAN) Logic
BAN logic [41] has the virtue of simplicity and effectiveness, so it is widely used in the formal analysis of security protocols. In the formal analysis of BAN logic, firstly, the known assumptions and security objectives of the protocol should be determined according to the actual situation. Secondly, the information exchanged between the subjects in the protocol are transformed into formulas in accordance with the logical form of BAN logic, that is, message idealization. Finally, with the help of inference rule of BAN logic, based on the known assumptions and idealized messages logical reasoning is carried out. If the inference result is consistent with the security objective, the analyzed protocol is secure. Otherwise, there are defects and loopholes in the protocol. (1) Basic symbols of BAN logic
P| ≡ X: P believes statement X
P) X: P sees statement X
P| ∼ . X: P once said statement X
#(X): X is fresh, X has not been sent before the agreement
P⇒X: P has jurisdiction over X
{ X } K : The result of X being encrypted by key K
(2) The main rules of BAN logic are given below:
R1. Message meaning rule:
R2. Nonce verification rule:
R3. Seeing rules:
R4. Arbitration rule:
R5. Freshness rule:
R6. Belief rule:
(3) Initial assumption:
A1:U i | ≡ # σ i A2:S j | ≡ # δ j
A3:
A4:
A5:
A7:
(4) Security goals:
Based on the above rules and assumptions, using BAN logic reasoning to analyze our proposed scheme, we can find that our scheme can achieve the expected four objectives. The specific analysis process is as follows:
S1.
Based on S1,A8 and message rule R1, we can get:
S2.
From hypothesis A2 and freshness rule R5, it can be inferred that::
S3.
On the basis of S2 and S3, the fresh number verification rule R2 can be obtained as follows:
S4.
Through conclusion S4 and belief rule R6, we get:
S5.
Under conclusion S5, based on hypothesis A4 and arbitration rule R4, we can get:
S6.
S7. U i ) { σ i , δ j } A i
Based on S7,A7 and message rule R1, we can get:
S8. U i |≡ S j | ∼ { σ i , δ j }
According to A1, using freshness rule R5:
S9. U i |≡ # { σ i , δ j }
From S8, S9 and nonce verification rule R2, we can get:
S10. U i |≡ S j | ≡ { σ i , δ j }
According to A7, the belief rule R6 is obtained as follows:
S11. U i |≡ S j | ≡ { σ i , δ j , A i }
According to the session key SK ij = h(MID i *||SID j || σ i || δ j *||A i *) and S11, we can get:
S12.
Based on S12 and assumption A3, using arbitration rule R4, we can get:
S13.
From the above analysis, we can know that the scheme we proposed is secure and there are no loopholes and defects. At the same time, mutual authentication between users and servers is secure.
Formal Security Analysis Using Real-or-Random(ROR) Model
The ROR model [42] is used to perform formal security analysis on the proposed protocol, which can prove that the session key established between the user and the server is secure. The specific process is briefly described as follows:
In our proposed scheme, there are three entities: user U i , server S j and registration center RC.
Execute (∏
t
, ∏
u
): By executing this query, adversary
Reveal (∏
t
): Adversary
Send (∏
t
,msg): Adversary
CorruptSD: (
Test (∏ t ): Follows the indistinguishable feature of ROR model, this query corresponds to the semantic security of session key SK ij established by U i and S j . Before the game starts, flip an unbiased coin(0 and 1 are equally probability to be chosen) and hide the result c.
On the premise that the session key SK ij is fresh, the adversary executes the Test query. ∏ t returns SK ij when c = 0, ∏ t returns a random number M of the same length as SK ij when c = 1. In other cases, it returns a null value (⊥).
We assume that an adversary can access the Test operation multiple times, but the number of access to the CorruptSD operation is limited.
G0: Under the random model, A launches a real attack on our protocol p. A needs to guess the size of c, which is randomly chosen before the game starts. According to the semantic security of session key, it can be obtained as follows:
G1: After adding Execute simulation to game G0, game G0 becomes game G1. In this game, we simulate eavesdropping attack. After game G1 ends, the adversary performs Test query. With the help of Reveal query, the adversary determines whether the result of the Test query is the actual session key SK
ij
or the random number M. In the proposed protocol, both user U
i
and server S
j
calculate the same session key SK
ij
= h(MID
i
||SID
j
||σ
i
||δ
j
||A
i
). If an adversary wants to calculate the session key SK
ij
, he needs to know two short-term random secrets σ
i
and δ
j
,and the long-term secret A
i
. In addition, it is difficult for an adversary to know the user U
i
’s pseudo-identity MID
i
. Obviously, the adversary cannot compute the session key SK
ij
. Thus the adversary’s advantage in winning the game does not increase, so:
G2: Compared with G1, G2 increases the simulation of Send operation and Hs query. In G2, the adversary deceives the instance to accept a message modified or forged by him. Therefore, G2 simulates an active attack.
G3: The G3 simulates an active attack. In addition to being able to emulate queries in G2, adversary can also emulate CorruptSD query. After being processed by the fuzzy extractor, the user’s biometrics become a secret value K
u
composed of l random bits. The adversary uses the values {F
ij
,Y
i
,V
i
,Z
i
,E
i
} stored in the SD
i
to guess K
u
∈{0,1}l, and the probability of correct guess is close to 1/2l. If the system has a limit on the number of input errors, we can know:
All random oracles are simulated in G3. In order to win the game, after the Test query, the adversary immediately guesses the real value of the result c. Obviously, the following can be obtained:
Where
In this section, in order to reflect the advantages of our proposed scheme, we compare the performance of the proposed scheme with the relevant schemes proposed by Lu et al. [44], Nassoro et al. [45], Gupta et al. [46], Haq et al. [37], Barman et al. [47], Roy et al. [48] and Zhang et al. [49]. Because each user and server only need to register once, we compare the login and authentication phases in terms of security, communication overhead and time complexity.
Security Comparison
In Table 2, we compare the performance of the proposed scheme with the seven multi-server authentication schemes mentioned above in resisting various attacks. The comparison results show that our scheme is secure against well-known attacks. On the contrary, the schemes [37] is difficult to resist user impersonation attacks, and cannot ensure the anonymity of users and the security of session keys. The schemes of [45] and [46] cannot achieve forward secrecy and resist stolen smart card attack. And [44] is vulnerable to user anonymity and untraceability, forgery attack and privileged-insider attack. The scheme [47–49] also contain security flaws, and are not resistant to all security attacks
Comparison of security and functional features
Comparison of security and functional features
Note: SF1:user anonymity and untraceability; SF2: mutual authentication; SF3: Resist stolen smart card attack; SF4: Resist replay attack; SF5: Resist forgery attack; SF6: Resist privileged-insider attack; SF7: Perfect forward secrecy; SF8: Resist Denial-of-Service attack; SF9: Resist user impersonation attack; SF10: Session key security; SF11: Resist server impersonation attack; SF12: Resist offline password guessing attack.
The time required for XOR and join operations is much less than that required for other operations, which is ignored here. We use the following notations to represent the time cost of each operation: T h : Time cost of executing one-way hash function
T f : Time cost of executing fuzzy extraction function
T e : Time cost of performing elliptic curve point multiplication function
T H : Time cost of executing biological hash function
T fz : Time cost of executing fuzzy commitment function
T p : The time cost of executing PUF functions
T sam : Time cost of symmetric/asymmetric encryption/decryption
According to the experimental results on the Intel Pentium IV 2600 MHz processor with 1024MB RAM [50], T h = 0.0023 ms, T f = 2.226 ms, T e = 2.226 ms and T p = 0.12 ms. According to [51, 52], T H = T e , T sam = T e and T H = T fz can be obtained. The calculation time cost of each authentication scheme is given in Table 3. The proposed scheme consumes 9T h , 1T f and T p to complete login and mutual authentication, which takes 2.3782 ms in total. Obviously, our scheme saves more time than that proposed by Nassoro et al. [45], Gupta et al. [46], Barman et al. [47], Roy et al. [48] and Zhang et al. [49]. Although the scheme proposed by Lu et al. [44] and Haq et al. [37] has a slightly lower computational cost than our scheme, our scheme has higher security.
Computation complexity comparison
Computation complexity comparison
In order to compare the communication cost of the protocol, it is assumed that the bit length of user identification, server identification and hash output (message digest) (we use SHA-1 as one-way hash function), timestamp and elliptic curve point P=(P x , P y ) are 160, 160, 160, 32 and (160 + 160)=320 bits respectively, where P x and P y represent the X and Y coordinates of point P respectively. The communication cost of each authentication scheme can be obtained as shown in Fig. 7. It can be seen that the scheme of Gupta et al. [46] requires the largest cost. Although the cost consumption of Lu [44], Haq et al. [33] and Roy et al. [48] are very close to that of our scheme, their scheme cannot resist some common security attacks. Therefore, the proposed scheme has a better balance between performance and security.

Comparison of Computation complexity.

Comparison of communication cost.
We still use the assumed length of all identifiers in 7.3 to calculate the storage space required for storing various valid information in the registration phase of users and servers. According to Table 4, [33] and [48] need to occupy the storage space of users and servers in a positive correlation with the number of servers. When the number of servers is enough, the storage space consumed by these two schemes will far exceed that of other schemes. The proposed scheme can reduce the consumption of user storage resources by adding remote databases. At the same time, data is stored separately, which is conducive to enhancing data security [47]. It consumes more storage than the proposed scheme. Schemes [44, 46, 49] consume slightly less storage space than the proposed scheme, but the proposed scheme has higher security.
Comparison of memory cost
Comparison of memory cost
The scheme proposed in this paper is an improved scheme based on the scheme of Haq et al. [33]. Firstly, we briefly review the scheme of Haq et al, analyze the security of their scheme, and find that their scheme is still unable to key compromise impersonation attack. Then we analyze the reasons for the security defects in the scheme of Haq et al. [33], and propose a key-free two factor multi-server key agreement authentication scheme based on PUF. Finally, we use formal and informal methods to prove that our proposed authentication scheme has high security, and compared with other similar authentication schemes are effective in communication overhead and computational complexity.
In the scheme, combining the uniqueness of user biometric characteristics with the uniqueness of physical device PUF to replace the password in the traditional authentication scheme can effectively improve the effectiveness of the scheme and the security of user privacy data. However, this scheme uses the original biometrics of users. In the following work, we will try to apply the cancelable biometrics technology to the scheme, so as to further meet the needs of users for the security. In addition, we will apply the proposed scheme to more real scenarios and strengthen the combination of theory and practical scenarios.
Footnotes
Acknowledgment
This work was supported in part by the NSFC (Nos. 61801004), NSF_AH (Nos. 2108085MF206).
Declarations
Conflicts of interests
We declare that we have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
