A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security

被引:45
作者
Li, Xiong [1 ,2 ]
Niu, Jianwei [2 ]
Kumari, Saru [3 ]
Islam, S. K. Hafizul [4 ]
Wu, Fan [5 ]
Khan, Muhammad Khurram [6 ]
Das, Ashok Kumar [7 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[3] Ch Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[4] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani Campus, Pilani 333031, Rajasthan, India
[5] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[6] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[7] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
User authentication; Chaotic maps; Session key agreement; Smart card; Multi-server environments; PASSWORD AUTHENTICATION; SMART-CARD; SCHEME; CRYPTANALYSIS; EFFICIENT; IMPROVEMENT; IDENTITY; PRIVACY;
D O I
10.1007/s11277-016-3293-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The widespread popularity of the computer networks has triggered concerns about information security. Password-based user authentication with key agreement protocols have drawn attentions since it provides proper authentication of a user before granting access right to services, and then ensure secure communication over insecure channels. Recently, Lee et al. pointed out different security flaws on Tsaur et al.'s multi-server user authentication protocol, and they further proposed an extended chaotic maps-based user authentication with key agreement protocol for multi-server environments. However, we observed that Lee et al.'s protocol has some functionality and security flaws, i.e., it is inefficient in detection of unauthorized login and it does not support password change mechanism. Besides, their protocol is vulnerable to registration center spoofing attack and server spoofing attack. In order to remedy the aforementioned flaws, we proposed a novel chaotic maps-based user authentication with key agreement protocol for multi-server environments. The proposed protocol is provably secure in the random oracle model under the chaotic-maps based computational Diffie-Hellman assumption. In addition, we analyzed our protocol using BAN logic model. We also compared our protocol with Lee et al.'s protocol in aspects of computation cost, functionalities and securities.
引用
收藏
页码:569 / 597
页数:29
相关论文
共 50 条
[21]   An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation [J].
Chang, Chin-Chen ;
Ngoc-Tu Nguyen .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (04) :1695-1715
[22]   A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment [J].
Zhu, Hongfeng .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (02) :811-829
[23]   On the Security of a Mutual Authentication and Key Agreement Protocol based on Chaotic Maps [J].
Chen, Chien-Ming ;
Xu, Linlin ;
Zhang, Xiaojie ;
Wu, Tsu-Yang ;
Pan, Jeng-Shyang .
2015 THIRD INTERNATIONAL CONFERENCE ON ROBOT, VISION AND SIGNAL PROCESSING (RVSP), 2015, :143-146
[24]   A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards [J].
Odelu, Vanga ;
Das, Ashok Kumar ;
Goswami, Adrijit .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) :1953-1966
[25]   Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment [J].
Amin, Ruhul ;
Biswas, G. P. .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (01) :439-462
[26]   An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography [J].
Reddy, Alavalapati Goutham ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Yoo, Kee-Young .
PLOS ONE, 2016, 11 (05)
[27]   An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol [J].
Hongfeng Zhu ;
Yan Zhang .
Wireless Personal Communications, 2017, 96 :217-229
[28]   A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments [J].
Li, Xiong ;
Ma, Jian ;
Wang, Wendong ;
Xiong, Yongping ;
Zhang, Junsong .
MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) :85-95
[29]   An Improved User Authentication Protocol Based on Chaotic Maps for Multiserver Environment [J].
Kumar, Devender ;
Chand, Satish ;
Kumar, Bijendra .
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2021, 24 (01) :58-78
[30]   A chaotic maps-based authenticated key agreement protocol with strong anonymity [J].
Tan, Zuowen .
NONLINEAR DYNAMICS, 2013, 72 (1-2) :311-320