{"id":"https://openalex.org/W2010110700","doi":"https://doi.org/10.1109/tifs.2014.2362979","title":"An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation","display_name":"An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation","publication_year":2014,"publication_date":"2014-10-14","ids":{"openalex":"https://openalex.org/W2010110700","doi":"https://doi.org/10.1109/tifs.2014.2362979","mag":"2010110700"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2014.2362979","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2362979","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://orbilu.uni.lu/handle/10993/32510","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060534829","display_name":"Jiangshan Yu","orcid":"https://orcid.org/0000-0001-8006-7392"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Jiangshan Yu","raw_affiliation_strings":["Department of Computer Science, University of Birmingham, Birmingham, U.K","Department of Computer Science, University of Birmingham, Birmingham, U.K.#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Birmingham, Birmingham, U.K","institution_ids":["https://openalex.org/I79619799"]},{"raw_affiliation_string":"Department of Computer Science, University of Birmingham, Birmingham, U.K.#TAB#","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100716525","display_name":"Guilin Wang","orcid":"https://orcid.org/0000-0002-3353-4290"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guilin Wang","raw_affiliation_strings":["Huawei International Pte Ltd., Singapore","Huawei International Pte Ltd, Singapore"],"affiliations":[{"raw_affiliation_string":"Huawei International Pte Ltd., Singapore","institution_ids":[]},{"raw_affiliation_string":"Huawei International Pte Ltd, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia","Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004646444","display_name":"Wei Gao","orcid":"https://orcid.org/0000-0002-8600-4752"},"institutions":[{"id":"https://openalex.org/I182707071","display_name":"Ludong University","ror":"https://ror.org/028h95t32","country_code":"CN","type":"education","lineage":["https://openalex.org/I182707071"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Gao","raw_affiliation_strings":["Department of Mathematics and Informatics, Ludong University, Yantai, China","[Department of Mathematics and Informatics, Ludong University, Yantai, China]"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Informatics, Ludong University, Yantai, China","institution_ids":["https://openalex.org/I182707071"]},{"raw_affiliation_string":"[Department of Mathematics and Informatics, Ludong University, Yantai, China]","institution_ids":["https://openalex.org/I182707071"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5060534829"],"corresponding_institution_ids":["https://openalex.org/I79619799"],"apc_list":null,"apc_paid":null,"fwci":19.6572,"has_fulltext":false,"cited_by_count":85,"citation_normalized_percentile":{"value":0.99100318,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"9","issue":"12","first_page":"2302","last_page":"2313"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8409221172332764},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.8011454343795776},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6572726964950562},{"id":"https://openalex.org/keywords/challenge\u2013response-authentication","display_name":"Challenge\u2013response authentication","score":0.6510177850723267},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6493773460388184},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.63811194896698},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6255967020988464},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.5981941223144531},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.58433997631073},{"id":"https://openalex.org/keywords/factor","display_name":"Factor (programming language)","score":0.558954119682312},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5317807197570801},{"id":"https://openalex.org/keywords/chip-authentication-program","display_name":"Chip Authentication Program","score":0.4806896150112152},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.4429781436920166},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.42716148495674133},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.41308334469795227},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.34104350209236145}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8409221172332764},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.8011454343795776},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6572726964950562},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.6510177850723267},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6493773460388184},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.63811194896698},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6255967020988464},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.5981941223144531},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.58433997631073},{"id":"https://openalex.org/C2781039887","wikidata":"https://www.wikidata.org/wiki/Q1391724","display_name":"Factor (programming language)","level":2,"score":0.558954119682312},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5317807197570801},{"id":"https://openalex.org/C142124187","wikidata":"https://www.wikidata.org/wiki/Q5101471","display_name":"Chip Authentication Program","level":5,"score":0.4806896150112152},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.4429781436920166},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.42716148495674133},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.41308334469795227},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34104350209236145},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2014.2362979","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2362979","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:eispapers-4289","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/eispapers/3273","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Engineering and Information Sciences - Papers: Part A","raw_type":"article"},{"id":"pmh:oai:orbilu.uni.lu:10993/32510","is_oa":true,"landing_page_url":"http://orbilu.uni.lu/handle/10993/32510","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Information Forensics and Security, 9 (12), 2302--2313 (2014)","raw_type":"peer reviewed"}],"best_oa_location":{"id":"pmh:oai:orbilu.uni.lu:10993/32510","is_oa":true,"landing_page_url":"http://orbilu.uni.lu/handle/10993/32510","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Information Forensics and Security, 9 (12), 2302--2313 (2014)","raw_type":"peer reviewed"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1208334278","display_name":null,"funder_award_id":"EP/L001802/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G1551815112","display_name":null,"funder_award_id":"61202475","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G594500851","display_name":null,"funder_award_id":"EP/H005501/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W1535290512","https://openalex.org/W1542059364","https://openalex.org/W1603495404","https://openalex.org/W1885156594","https://openalex.org/W1966841760","https://openalex.org/W1981342917","https://openalex.org/W1983831676","https://openalex.org/W1997330811","https://openalex.org/W1999788626","https://openalex.org/W2016120028","https://openalex.org/W2017815160","https://openalex.org/W2021923324","https://openalex.org/W2026772001","https://openalex.org/W2029874224","https://openalex.org/W2032551902","https://openalex.org/W2049355773","https://openalex.org/W2055507113","https://openalex.org/W2067438990","https://openalex.org/W2070188354","https://openalex.org/W2076392080","https://openalex.org/W2082874810","https://openalex.org/W2096426839","https://openalex.org/W2106137793","https://openalex.org/W2109554690","https://openalex.org/W2113446256","https://openalex.org/W2114024372","https://openalex.org/W2116380612","https://openalex.org/W2124926080","https://openalex.org/W2127451689","https://openalex.org/W2127593133","https://openalex.org/W2135543188","https://openalex.org/W2138121290","https://openalex.org/W2144342348","https://openalex.org/W2144596760","https://openalex.org/W2147764505","https://openalex.org/W2151413173","https://openalex.org/W2151915275","https://openalex.org/W2152882618","https://openalex.org/W2153281696","https://openalex.org/W2157298821","https://openalex.org/W2161239015","https://openalex.org/W2165367855","https://openalex.org/W2168397026","https://openalex.org/W2169556652","https://openalex.org/W2171246410","https://openalex.org/W2570008916","https://openalex.org/W3102028743","https://openalex.org/W4242126308","https://openalex.org/W6632410262","https://openalex.org/W6639610839","https://openalex.org/W6678448622","https://openalex.org/W6681749759","https://openalex.org/W6682852172","https://openalex.org/W6683896060"],"related_works":["https://openalex.org/W2093798919","https://openalex.org/W2050433615","https://openalex.org/W2907262898","https://openalex.org/W2390304521","https://openalex.org/W2393298610","https://openalex.org/W2584552228","https://openalex.org/W4385414233","https://openalex.org/W2558166637","https://openalex.org/W4200155052","https://openalex.org/W2547223571"],"abstract_inverted_index":{"Remote":[0],"authentication":[1,15,63,70,88,94],"has":[2],"been":[3],"widely":[4],"studied":[5],"and":[6,37,101,115],"adapted":[7],"in":[8],"distributed":[9],"systems.":[10],"The":[11,53],"security":[12,59],"of":[13,21,25,60],"remote":[14],"mechanisms":[16],"mostly":[17],"relies":[18],"on":[19],"one":[20],"or":[22],"the":[23,58,109],"combination":[24],"three":[26],"factors:":[27],"1)":[28],"something":[29,33,39],"users":[30,34,40],"know\u2014password;":[31],"2)":[32],"have\u2014smart":[35],"card;":[36],"3)":[38],"are\u2014biometric":[41],"characteristics.":[42],"This":[43],"paper":[44],"introduces":[45],"an":[46],"efficient":[47],"generic":[48,55],"framework":[49,56],"for":[50],"three-factor":[51,69,93],"authentication.":[52],"proposed":[54],"enhances":[57],"existing":[61],"two-factor":[62,87],"schemes":[64],"by":[65,83],"upgrading":[66,84],"them":[67],"to":[68,90,106],"schemes,":[71],"without":[72],"exposing":[73],"user":[74],"privacy.":[75],"In":[76],"addition,":[77],"we":[78],"present":[79],"a":[80,85,91],"case":[81],"study":[82],"secure":[86,92],"scheme":[89,111],"scheme.":[95],"Furthermore,":[96],"implementation":[97],"analysis,":[98],"formal":[99],"proof,":[100],"privacy":[102,116],"discussion":[103],"are":[104],"provided":[105],"show":[107],"that":[108],"derived":[110],"is":[112],"practical,":[113],"secure,":[114],"preserving.":[117]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":12},{"year":2015,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
