An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture

被引:34
作者
Irshad, Azeem [1 ]
Chaudhry, Shehzad Ashraf [1 ]
Xie, Qi [2 ]
Li, Xiong [3 ]
Farash, Mohammad Sabzinejad [4 ]
Kumari, Saru [5 ]
Wu, Fan [6 ]
机构
[1] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[2] Hangzhou Normal Univ, Hangzhou Key Lab Cryptog & Network Secur, Hangzhou, Zhejiang, Peoples R China
[3] Hunan Univ Sci & Technol, Xiangtan, Peoples R China
[4] Kharazmi Univ, Fac Math Sci & Comp, Tehran, Iran
[5] Chaudhary Charan Singh Univ, Meerut 250004, Uttar Pradesh, India
[6] Xiamen Inst Technol, Xiamen, Peoples R China
基金
中国国家自然科学基金;
关键词
Multi-server authentication; Chebyshev chaotic map; Cryptography; Authentication; Attacks; USER AUTHENTICATION; PASSWORD AUTHENTICATION; SMART-CARD; SCHEME; EFFICIENT; PROTOCOL; CRYPTANALYSIS; IMPROVEMENT;
D O I
10.1007/s13369-017-2764-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In the multi-server authentication (MSA) paradigm, a subscriber might avail multiple services of different service providers, after registering from registration authority. In this approach, the user has to remember only a single password for all service providers, and servers are relieved of individualized registrations. Many MSA-related schemes have been presented so far, however with several drawbacks. In this connection, recently Li et al. in Wirel. Pers. Commun., (2016). doi:10.1007/s11277-016-3293-x presented a chaotic map-based multi-server authentication scheme. However, we observed that Li et al. suffer from malicious server insider attack, stolen smart card attack, and session-specific temporary information attack. This research work is based on improving security of Li et al.'s protocol in minimum possible computation cost. We also evaluate the security for the contributed work which is provable under formal security analysis employing random oracle model and BAN Logic.
引用
收藏
页码:811 / 828
页数:18
相关论文
共 53 条
[1]  
[Anonymous], 2011, 2011365 CRYPT EPRINT
[2]  
[Anonymous], 2017, MULTIMED TOOLS APPL
[3]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[4]   An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography [J].
Ch, Shehzad Ashraf ;
Uddin, Nizam ;
Sher, Muhammad ;
Ghani, Anwar ;
Naqvi, Husnain ;
Irshad, Azeem .
MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (05) :1711-1723
[5]   An efficient and secure multi-server password authentication scheme using smart cards [J].
Chang, CC ;
Lee, JS .
2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2004, :417-422
[7]   A two-factor authentication scheme with anonymity for multi-server environments [J].
Chen, Chi-Tung ;
Lee, Cheng-Chi .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) :1608-1625
[8]   More on security of public-key cryptosystems based on Chebyshev polynomials [J].
Cheong, Kai Y. ;
Koshiba, Takeshi .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2007, 54 (09) :795-799
[9]   Robust Biometrics-Based Authentication Scheme for Multiserver Environment [J].
He, Debiao ;
Wang, Ding .
IEEE SYSTEMS JOURNAL, 2015, 9 (03) :816-823
[10]   Cryptanalysis of a Smartcard-Based User Authentication Scheme for Multi-Server Environments [J].
He, Debiao ;
Hu, Hao .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (09) :3052-3054