A provably secure multi-server authentication scheme based on Chebyshev chaotic map

被引:6
作者
Chen, Rui [1 ]
Mou, Yongcong [2 ]
Li, Wei [1 ]
机构
[1] Sichuan Normal Univ, Coll Comp Sci, Chengdu, Peoples R China
[2] Sichuan Water Conservancy Vocat Coll, Chengdu, Peoples R China
关键词
Authentication; Chaotic map; Multi-server environments; Provable security; Random oracle model; USER AUTHENTICATION; PROTOCOL; EFFICIENT; PASSWORD;
D O I
10.1016/j.jisa.2024.103788
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet provides us a lot of online services. Under the conventional single-server architectures, remote users must register separately on each visited server to obtain the required services. In contrast, with a multi-server architecture, users can freely access subscribed services from multiple servers by registering at a single registration center ( RC ). Currently, biometrics are widely applied in user authentication schemes to improve their security. Combining with biometric authentication techniques, we present an anonymous authentication scheme by using Chebyshev chaotic map to achieve authentication of both communicating parties in multi-server scenario. The core point of this new scheme is the use of chaotic mapping to achieve mutual authentication instead of time-consuming authentication methods, thus leading to higher efficiency. Based on the widely used Real-Or-Random(ROR) model and the Proverif tool, we perform a formal security analysis of the proposed scheme. In addition, the comparison of security attributes and performance with other related works indicates that the new scheme can withstand various attacks and better suited to multi-server application scenarios.
引用
收藏
页数:11
相关论文
共 36 条
[1]   Password-based authenticated key exchange in the three-party setting [J].
Abdalla, M. ;
Fouque, P.-A. ;
Pointcheval, D. .
IEE Proceedings: Information Security, 2006, 153 (01) :27-39
[2]   A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Khan, Muhammad Khurram ;
Karati, Arijit ;
Giri, Debasis ;
Kumari, Saru .
SECURITY AND COMMUNICATION NETWORKS, 2017,
[3]   Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment [J].
Chatterjee, Santanu ;
Roy, Sandip ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) :824-839
[4]   An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey [J].
Chuang, Yun-Hsin ;
Lei, Chin-Laung .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (01)
[5]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[6]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[7]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[8]   Three-Factor UCSSO Scheme With Fast Authentication and Privacy Protection for Telecare Medicine Information Systems [J].
Hsu, Chien-Lung ;
Le, Tuan-Vinh ;
Hsieh, Mei-Chen ;
Tsai, Kuo-Yu ;
Lu, Chung-Fu ;
Lin, Tzu-Wei .
IEEE ACCESS, 2020, 8 :196553-196566
[9]   A Time Bound Dynamic Group Key Distribution Scheme with Anonymous Three-Factor Identification for IoT-Based Multi-Server Environments [J].
Hsu, Chien-Lung ;
Tuan-Vinh Le .
2020 15TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2020), 2020, :59-65
[10]   An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme [J].
Irshad, Azeem ;
Sher, Muhammad ;
Ashraf, Muhammad Usman ;
Alzahrani, Bander A. ;
Wu, Fan ;
Xie, Qi ;
Kumari, Saru .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) :3185-3208