{"id":"https://openalex.org/W3006809229","doi":"https://doi.org/10.1109/access.2020.2975615","title":"A Secure Biometrics and PUFs-Based Authentication Scheme With Key Agreement For Multi-Server Environments","display_name":"A Secure Biometrics and PUFs-Based Authentication Scheme With Key Agreement For Multi-Server Environments","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3006809229","doi":"https://doi.org/10.1109/access.2020.2975615","mag":"3006809229"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2975615","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2975615","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09006882.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09006882.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036868704","display_name":"Jun Zhao","orcid":"https://orcid.org/0000-0003-0725-6204"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jun Zhao","raw_affiliation_strings":["School of Computer and Information, Anhui Normal University, Wuhu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042471611","display_name":"Weixin Bian","orcid":"https://orcid.org/0000-0003-2341-5359"},"institutions":[{"id":"https://openalex.org/I4210145049","display_name":"Anhui Institute of Information Technology","ror":"https://ror.org/04mw2ty13","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210145049"]},{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weixin Bian","raw_affiliation_strings":["Anhui Province Key Laboratory of Network and Information Security, Wuhu, China","School of Computer and Information, Anhui Normal University, Wuhu, China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Network and Information Security, Wuhu, China","institution_ids":["https://openalex.org/I4210145049"]},{"raw_affiliation_string":"School of Computer and Information, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018515270","display_name":"Deqin Xu","orcid":"https://orcid.org/0000-0003-1679-5680"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deqin Xu","raw_affiliation_strings":["School of Computer and Information, Anhui Normal University, Wuhu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054044789","display_name":"Biao Jie","orcid":"https://orcid.org/0000-0002-3722-4935"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biao Jie","raw_affiliation_strings":["School of Computer and Information, Anhui Normal University, Wuhu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046548347","display_name":"Xintao Ding","orcid":"https://orcid.org/0000-0003-3325-3306"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xintao Ding","raw_affiliation_strings":["School of Computer and Information, Anhui Normal University, Wuhu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063773228","display_name":"Wen Zhou","orcid":"https://orcid.org/0000-0002-1266-1864"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wen Zhou","raw_affiliation_strings":["School of Computer and Information, Anhui Normal University, Wuhu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032345419","display_name":"Hui Zhang","orcid":"https://orcid.org/0000-0003-2556-9423"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Zhang","raw_affiliation_strings":["School of Computer and Information, Anhui Normal University, Wuhu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5036868704"],"corresponding_institution_ids":["https://openalex.org/I4472751"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":6.1202,"has_fulltext":true,"cited_by_count":39,"citation_normalized_percentile":{"value":0.96507257,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"8","issue":null,"first_page":"45292","last_page":"45303"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8236861228942871},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.6886076927185059},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6319348812103271},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6289392709732056},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.59906005859375},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5852053165435791},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5233011841773987},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4772332012653351},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4404483437538147},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.43784135580062866},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4293532073497772},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3511000871658325}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8236861228942871},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.6886076927185059},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6319348812103271},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6289392709732056},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.59906005859375},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5852053165435791},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5233011841773987},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4772332012653351},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4404483437538147},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.43784135580062866},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4293532073497772},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3511000871658325}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.2975615","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2975615","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09006882.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ba317c504bcc46f1ac6c608fbb51bd8c","is_oa":true,"landing_page_url":"https://doaj.org/article/ba317c504bcc46f1ac6c608fbb51bd8c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 45292-45303 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2975615","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2975615","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09006882.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.75,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1875819041","display_name":null,"funder_award_id":"1708085MF14","funder_id":"https://openalex.org/F4320334897","funder_display_name":"Natural Science Foundation of Anhui Province"},{"id":"https://openalex.org/G3409867941","display_name":null,"funder_award_id":"61976006","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G655702915","display_name":null,"funder_award_id":"1708085MF145","funder_id":"https://openalex.org/F4320334897","funder_display_name":"Natural Science Foundation of Anhui Province"},{"id":"https://openalex.org/G8057789034","display_name":null,"funder_award_id":"1708085","funder_id":"https://openalex.org/F4320334897","funder_display_name":"Natural Science Foundation of Anhui Province"},{"id":"https://openalex.org/G8094703884","display_name":null,"funder_award_id":"61972438","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8691427033","display_name":null,"funder_award_id":"1808085MF171","funder_id":"https://openalex.org/F4320334897","funder_display_name":"Natural Science Foundation of Anhui Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334897","display_name":"Natural Science Foundation of Anhui Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3006809229.pdf","grobid_xml":"https://content.openalex.org/works/W3006809229.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W143030755","https://openalex.org/W1498573661","https://openalex.org/W1965929698","https://openalex.org/W1973268891","https://openalex.org/W1985997828","https://openalex.org/W1986912309","https://openalex.org/W2010939995","https://openalex.org/W2014209446","https://openalex.org/W2014750966","https://openalex.org/W2018300500","https://openalex.org/W2030248862","https://openalex.org/W2038085759","https://openalex.org/W2049851136","https://openalex.org/W2060379433","https://openalex.org/W2062821710","https://openalex.org/W2106150202","https://openalex.org/W2113446256","https://openalex.org/W2137072047","https://openalex.org/W2141382172","https://openalex.org/W2155392226","https://openalex.org/W2159919811","https://openalex.org/W2172250193","https://openalex.org/W2173077903","https://openalex.org/W2243569459","https://openalex.org/W2403818374","https://openalex.org/W2530071250","https://openalex.org/W2531017060","https://openalex.org/W2583267683","https://openalex.org/W2626274598","https://openalex.org/W2745191645","https://openalex.org/W2772594442","https://openalex.org/W2776313266","https://openalex.org/W2800426337","https://openalex.org/W2805592916","https://openalex.org/W2851625681","https://openalex.org/W2884490460","https://openalex.org/W2895802336","https://openalex.org/W2966364580","https://openalex.org/W6631658552"],"related_works":["https://openalex.org/W2182686533","https://openalex.org/W2482813613","https://openalex.org/W2363600212","https://openalex.org/W2736044769","https://openalex.org/W2619897385","https://openalex.org/W1966405014","https://openalex.org/W2364805998","https://openalex.org/W2963069143","https://openalex.org/W106082050","https://openalex.org/W2371920768"],"abstract_inverted_index":{"The":[0,160],"emergence":[1],"of":[2,19,33,68,76,130,171,205,216],"multi-server":[3,103,182],"authentication":[4,47,53,96,176,210],"key":[5,98,178],"protocol":[6,211],"schemes":[7,62],"provides":[8],"a":[9,24,93,194],"viable":[10],"environment":[11],"for":[12],"users":[13],"to":[14,113,199],"easily":[15],"access":[16],"the":[17,31,60,102,115,119,122,127,131,169,181,201,214],"services":[18],"multiple":[20],"legitimate":[21],"servers":[22],"through":[23],"single":[25],"registration.":[26],"Biometric":[27],"identification":[28],"technology":[29,48],"has":[30],"characteristics":[32],"forgery":[34],"difficulty,":[35,40],"duplication":[36],"difficulty":[37],"and":[38,84,97,121,134,153,157,173,177,193,203],"guess":[39],"etc.":[41],"Therefore,":[42],"it":[43],"is":[44],"an":[45],"indispensable":[46],"in":[49,59,101,180],"smart":[50,71,132],"card-based":[51],"user":[52,77,79,95,120],"protocol.":[54],"There":[55],"are":[56,111],"many":[57],"shortcomings":[58],"existing":[61],"based":[63],"on":[64],"biometrics,":[65],"including":[66],"leakages":[67],"biometrics":[69,135],"information,":[70],"card":[72,133],"theft":[73],"attack,":[74,81],"lack":[75],"anonymity,":[78],"impersonation":[80],"server":[82],"impersonation,":[83],"so":[85,158],"on.":[86,159],"To":[87,105],"overcome":[88],"these":[89],"shortcomings,":[90],"we":[91,108,140,185],"propose":[92],"new":[94],"agreement":[99,179],"scheme":[100,162],"environment.":[104,183],"some":[106],"extent,":[107],"not":[109],"only":[110],"able":[112],"guarantee":[114],"communication":[116],"security":[117,129,202,215],"between":[118],"servers,":[123],"but":[124],"also":[125],"ensure":[126],"physical":[128],"information.":[136],"In":[137],"this":[138],"respect,":[139],"use":[141,170],"lightweight":[142],"cryptographic":[143],"primitives,":[144],"such":[145],"as":[146],"Physically":[147],"Unclonable":[148],"Functions":[149],"(PUFs),":[150],"Fuzzy":[151],"extractor":[152],"One-way":[154],"hash":[155],"functions,":[156],"proposed":[161,206],"can":[163,212],"effectively":[164],"protect":[165,213],"user's":[166],"anonymity":[167],"without":[168],"password":[172],"provide":[174],"mutual":[175],"Subsequently,":[184],"used":[186],"informal":[187],"analysis,":[188],"Burrows-Abadi-Needham":[189],"Logic":[190],"(BAN-Logic)":[191],"proof,":[192],"widely":[195],"accepted":[196],"Real-Or-Random":[197],"model":[198],"prove":[200],"robustness":[204],"scheme.":[207],"Finally,":[208],"our":[209],"communication.":[217]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
