An efficient authentication with key agreement procedure using Mittag-Leffler-Chebyshev summation chaotic map under the multi-server architecture

被引:7
|
作者
Meshram, Chandrashekhar [1 ]
Ibrahim, Rabha W. [2 ]
Meshram, Sarita Gajbhiye [3 ]
Jamal, Sajjad Shaukat [4 ]
Imoize, Agbotiname Lucky [5 ,6 ]
机构
[1] Coll Chhindwara Univ, Jayawanti Haksar Govt Postgrad Coll, Dept Post Grad Studies & Res Math, Betul 460001, MP, India
[2] IEEE 94086547, Kuala Lumpur 59200, Malaysia
[3] Ton DucThang Univ, Dept Management Sci & Technol Dev, Ho Chi Minh City, Vietnam
[4] King Khalid Univ, Coll Sci, Dept Math, Abha, Saudi Arabia
[5] Univ Lagos, Fac Engn, Dept Elect & Elect Engn, Lagos 100213, Nigeria
[6] Ruhr Univ, Inst Digital Commun, Dept Elect Engn & Informat Technol, D-44801 Bochum, Germany
来源
JOURNAL OF SUPERCOMPUTING | 2022年 / 78卷 / 04期
关键词
Mittag-Leffler-Chebyshev Summation Chaotic Map (MLCSCM); Computer networks; Mutual authentication; Multi-server architecture; Key exchange; Smart card; REMOTE USER AUTHENTICATION; SCHEME; SECURE; PROTOCOL;
D O I
10.1007/s11227-021-04039-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The recent technological advancement and rapid development of computer networks have increased the popularity of remote password authentication protocols. Toward this end, the emphasis has shifted to protocols that apply to smart cards-empowered multi-server environments. In order to defend against the replay attack, these protocols usually depend on the nonce or timestamp. In this paper, an efficient Mittag-Leffler-Chebyshev Summation Chaotic Map (MLCSCM)-enabled multi-server authentication protocol with the key agreement is proposed and generalized to address this peculiarity in multi-server-oriented applications. The security proof and efficiency analysis of the presented MLCSCM authenticated key agreement protocol is rigorously derived and validated. Compared to the recently published literature, the proposed protocol presents high efficiency with unique features, and it is highly resistant to sophisticated attacks and achieves perfect forward secrecy.
引用
收藏
页码:4938 / 4959
页数:22
相关论文
共 49 条
  • [31] A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security
    Xiong Li
    Jianwei Niu
    Saru Kumari
    SK Hafizul Islam
    Fan Wu
    Muhammad Khurram Khan
    Ashok Kumar Das
    Wireless Personal Communications, 2016, 89 : 569 - 597
  • [32] A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security
    Li, Xiong
    Niu, Jianwei
    Kumari, Saru
    Islam, S. K. Hafizul
    Wu, Fan
    Khan, Muhammad Khurram
    Das, Ashok Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 569 - 597
  • [33] A Secure Biometric Based L ser Authentication Scheme for Multi-server Environment Using Chaotic Map
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    Polai, Monalisha
    2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2019, : 637 - 642
  • [34] ELAKA: Energy-Efficient and Lightweight Multi-Server Authentication and Key Agreement Protocol Based on Dynamic Biometrics
    Liu, Xiaoxue
    Li, Yanping
    Qu, Juan
    Lu, Laifeng
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (03) : 767 - 785
  • [35] Anonymous biometrics-based authentication with key agreement scheme for multi-server environment using ECC
    Mingping Qi
    Jianhua Chen
    Multimedia Tools and Applications, 2019, 78 : 27553 - 27568
  • [36] Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards
    Lu, Yanrong
    Li, Lixiang
    Yang, Xing
    Yang, Yixian
    PLOS ONE, 2015, 10 (05):
  • [37] ELAKA: Energy-Efficient and Lightweight Multi-Server Authentication and Key Agreement Protocol Based on Dynamic Biometrics
    Xiaoxue Liu
    Yanping Li
    Juan Qu
    Laifeng Lu
    Wireless Personal Communications, 2018, 100 : 767 - 785
  • [38] A Complete User Authentication and Key Agreement Scheme Using Cancelable Biometrics and PUF in Multi-Server Environment
    Zhang, Hui
    Bian, Weixin
    Jie, Biao
    Xu, Deqin
    Zhao, Jun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 5413 - 5428
  • [39] Anonymous biometrics-based authentication with key agreement scheme for multi-server environment using ECC
    Qi, Mingping
    Chen, Jianhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (19) : 27553 - 27568
  • [40] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
    ul Haq, Inam
    Wang, Jian
    Zhu, Youwen
    Maqbool, Saad
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (01) : 140 - 150