2023
DOI: 10.1016/j.comcom.2023.09.020
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Privacy-Preserving ECC-Based Three-Factor Authentication Scheme for Metaverse Environment

Garima Thakur,
Pankaj Kumar,
Chein-Ming Chen
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 34 publications
0
1
0
Order By: Relevance
“…Thus, the avatar authentication phase developed by Ryu et al could expose users' private information to providers of metaverse services [11]. In addition, their scheme had high computational cost [12]. Therefore, Kim et al [11], proposed a secure authentication scheme between avatars that allows users to protect their privacy during avatar interactions without relying on the service provider.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the avatar authentication phase developed by Ryu et al could expose users' private information to providers of metaverse services [11]. In addition, their scheme had high computational cost [12]. Therefore, Kim et al [11], proposed a secure authentication scheme between avatars that allows users to protect their privacy during avatar interactions without relying on the service provider.…”
Section: Related Workmentioning
confidence: 99%
“…However, after our security analysis we found out that their protocol was vulnerable to private key disclosure providing an adversary with multiple advantages. Thakur et al [12], proposed a secure mutual authentication scheme for safer user-server and avatar-avatar interactions utilizing Elliptic Curve Cryptography (ECC) and fuzzy extractor. Nevertheless, they assume that their scheme is vulnerable against physical implementation attacks including differential side-channel analysis and deep learning-based side-channel analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Ryu et al [6] presented a mutual authentication scheme using Elliptic Curve Cryptography (ECC) to offer secure communication between users and servers as well as secure interactions between avatars and avatars of the platform. Thakur et al [7] proposed a secure ECC-based authentication scheme utilizing a fuzzy extractor for more secure user-server and avatar-avatar interactions. However, the high computational cost of the above literature makes them unsuitable for deployment into the metaverse.…”
Section: Introductionmentioning
confidence: 99%
“…As interest in metaverse has surged, extensive research has been conducted on the constituent technologies comprising metaverse [7], [8], as well as on harnessing metaverse [9], [10]. Specially, considerable efforts have been devoted to the authentication of metaverse users [11]- [13].…”
Section: Introductionmentioning
confidence: 99%