A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security

被引:45
|
作者
Li, Xiong [1 ,2 ]
Niu, Jianwei [2 ]
Kumari, Saru [3 ]
Islam, S. K. Hafizul [4 ]
Wu, Fan [5 ]
Khan, Muhammad Khurram [6 ]
Das, Ashok Kumar [7 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[3] Ch Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[4] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani Campus, Pilani 333031, Rajasthan, India
[5] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[6] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[7] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
User authentication; Chaotic maps; Session key agreement; Smart card; Multi-server environments; PASSWORD AUTHENTICATION; SMART-CARD; SCHEME; CRYPTANALYSIS; EFFICIENT; IMPROVEMENT; IDENTITY; PRIVACY;
D O I
10.1007/s11277-016-3293-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The widespread popularity of the computer networks has triggered concerns about information security. Password-based user authentication with key agreement protocols have drawn attentions since it provides proper authentication of a user before granting access right to services, and then ensure secure communication over insecure channels. Recently, Lee et al. pointed out different security flaws on Tsaur et al.'s multi-server user authentication protocol, and they further proposed an extended chaotic maps-based user authentication with key agreement protocol for multi-server environments. However, we observed that Lee et al.'s protocol has some functionality and security flaws, i.e., it is inefficient in detection of unauthorized login and it does not support password change mechanism. Besides, their protocol is vulnerable to registration center spoofing attack and server spoofing attack. In order to remedy the aforementioned flaws, we proposed a novel chaotic maps-based user authentication with key agreement protocol for multi-server environments. The proposed protocol is provably secure in the random oracle model under the chaotic-maps based computational Diffie-Hellman assumption. In addition, we analyzed our protocol using BAN logic model. We also compared our protocol with Lee et al.'s protocol in aspects of computation cost, functionalities and securities.
引用
收藏
页码:569 / 597
页数:29
相关论文
共 50 条
  • [1] A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security
    Xiong Li
    Jianwei Niu
    Saru Kumari
    SK Hafizul Islam
    Fan Wu
    Muhammad Khurram Khan
    Ashok Kumar Das
    Wireless Personal Communications, 2016, 89 : 569 - 597
  • [2] Cryptanalysis of a Chaotic Maps-based User Authentication and Key Agreement Protocol for Multi-server Environments
    Zhang, Jiao
    He, Yong
    Liu, Yu-zhen
    Li, Xiong
    INTERNATIONAL CONFERENCE ON ADVANCES IN MANAGEMENT SCIENCE AND ENGINEERING (AMSE 2015), 2015, : 155 - 159
  • [3] Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments
    Tsai, Jia-Lun
    Lo, Nai-Wei
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (11) : 1971 - 1978
  • [4] Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps
    Lin, Tzu-Wei
    Hsu, Chien-Lung
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4521 - 4541
  • [5] Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps
    Tzu-Wei Lin
    Chien-Lung Hsu
    The Journal of Supercomputing, 2018, 74 : 4521 - 4541
  • [6] An authentication scheme for multi-server environments based on chaotic maps
    Tao, Yun
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (03) : 250 - 261
  • [7] A Chaotic Maps-based Key Agreement Protocol that Preserves User Anonymity
    Tseng, Huei-Ru
    Jan, Rong-Hong
    Yang, Wuu
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 850 - 855
  • [8] An extended chaotic maps-based key agreement protocol with user anonymity
    Lee, Cheng-Chi
    Chen, Chin-Ling
    Wu, Chia-Ying
    Huang, Shiow-Yuan
    NONLINEAR DYNAMICS, 2012, 69 (1-2) : 79 - 87
  • [9] An extended chaotic maps-based key agreement protocol with user anonymity
    Cheng-Chi Lee
    Chin-Ling Chen
    Chia-Ying Wu
    Shiow-Yuan Huang
    Nonlinear Dynamics, 2012, 69 : 79 - 87
  • [10] An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol
    Zhu, Hongfeng
    Zhang, Yan
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 217 - 229