An improved and secure chaotic map based authenticated key agreement in multi-server architecture

被引:17
作者
Irshad, Azeem [1 ]
Sher, Muhammad [1 ]
Chaudhry, Shehzad Ashraf [1 ]
Xie, Qi [2 ]
Kumari, Saru [3 ]
Wu, Fan [4 ]
机构
[1] Int Islamic Univ, Comp Sci Dept, Islamabad, Pakistan
[2] Hangzhou Normal Univ, Hangzhou Key Lab Cryptog & Network Secur, Hangzhou, Peoples R China
[3] Chaudhary Charan Singh Univ, Meerut 250004, Uttar Pradesh, India
[4] Xiamen Inst Technol, Xiamen, Peoples R China
关键词
Multi-server authentication; Chebyshev chaotic map; Cryptography; Authentication key agreement; WAY HASH FUNCTION; SMART CARDS; PASSWORD AUTHENTICATION; CHEBYSHEV POLYNOMIALS; SCHEME; PROTOCOL; EFFICIENT; PRIVACY; CRYPTANALYSIS; SYSTEM;
D O I
10.1007/s11042-016-4236-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-Server Authentication (MSA) provides the user an efficient way to avail multiple services of various multimedia service providers, once after getting registered from a registration centre. Previously, a user had to register all servers individually to use their respective service; which proves to be a redundant and inefficient procedure in comparison with MSA. Many MSA-based techniques have been put forward by researchers, so far, however with proven pitfalls. In the last few years, the focus has been shifted towards a more flexible and efficient Chebyshev cryptographic technique. In this regard, recently Tan's scheme presented a chaotic map based multi-server authentication scheme with a focus on login scalability. Nonetheless, Tan's scheme has been found vulnerable to insider (impersonation attack) and stolen smart card attacks. Besides, the Tan's scheme fails to differentiate the login requests between the two presented cases. The current study work is based on improving the Tan's technique in terms of security in almost an equivalent cost. The security for proposed work is evaluated in the performance evaluation section, while it shows that the security is provable under formal security model, as well as using BAN Logic.
引用
收藏
页码:1167 / 1204
页数:38
相关论文
共 50 条
[41]   Secure chaotic system with application to chaotic ciphers [J].
Wang, Xiaomin ;
Zhang, Wenfang ;
Guo, Wei ;
Zhang, Jiashu .
INFORMATION SCIENCES, 2013, 221 :555-570
[42]   An improved key agreement protocol based on chaos [J].
Wang, Xingyuan ;
Zhao, Jianfeng .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (12) :4052-4057
[43]   A combined chaotic cryptographic and hashing scheme [J].
Wong, KW .
PHYSICS LETTERS A, 2003, 307 (5-6) :292-298
[44]   One-way Hash function construction based on the chaotic map with changeable-parameter [J].
Xiao, D ;
Liao, XF ;
Deng, SJ .
CHAOS SOLITONS & FRACTALS, 2005, 24 (01) :65-71
[45]   An efficient entire chaos-based scheme for deniable authentication [J].
Xiao, D ;
Liao, XF ;
Wong, KW .
CHAOS SOLITONS & FRACTALS, 2005, 23 (04) :1327-1331
[46]   Security improvement on an anonymous key agreement protocol based on chaotic maps [J].
Xue, Kaiping ;
Hong, Peilin .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (07) :2969-2977
[47]   Efficiency and security problems of anonymous key agreement protocol based on chaotic maps [J].
Yoon, Eun-Jun .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (07) :2735-2740
[48]   Cryptanalysis of the public key encryption based on multiple chaotic systems [J].
Zhang, Linhua .
CHAOS SOLITONS & FRACTALS, 2008, 37 (03) :669-674
[49]   Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials [J].
Zhao, Fengjun ;
Gong, Peng ;
Li, Shuai ;
Li, Mingguan ;
Li, Ping .
NONLINEAR DYNAMICS, 2013, 74 (1-2) :419-427
[50]   A provable privacy-protection system for multi-server environment [J].
Zhu, Hongfeng .
NONLINEAR DYNAMICS, 2015, 82 (1-2) :835-849