A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security

被引:45
作者
Li, Xiong [1 ,2 ]
Niu, Jianwei [2 ]
Kumari, Saru [3 ]
Islam, S. K. Hafizul [4 ]
Wu, Fan [5 ]
Khan, Muhammad Khurram [6 ]
Das, Ashok Kumar [7 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[3] Ch Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[4] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani Campus, Pilani 333031, Rajasthan, India
[5] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[6] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[7] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
User authentication; Chaotic maps; Session key agreement; Smart card; Multi-server environments; PASSWORD AUTHENTICATION; SMART-CARD; SCHEME; CRYPTANALYSIS; EFFICIENT; IMPROVEMENT; IDENTITY; PRIVACY;
D O I
10.1007/s11277-016-3293-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The widespread popularity of the computer networks has triggered concerns about information security. Password-based user authentication with key agreement protocols have drawn attentions since it provides proper authentication of a user before granting access right to services, and then ensure secure communication over insecure channels. Recently, Lee et al. pointed out different security flaws on Tsaur et al.'s multi-server user authentication protocol, and they further proposed an extended chaotic maps-based user authentication with key agreement protocol for multi-server environments. However, we observed that Lee et al.'s protocol has some functionality and security flaws, i.e., it is inefficient in detection of unauthorized login and it does not support password change mechanism. Besides, their protocol is vulnerable to registration center spoofing attack and server spoofing attack. In order to remedy the aforementioned flaws, we proposed a novel chaotic maps-based user authentication with key agreement protocol for multi-server environments. The proposed protocol is provably secure in the random oracle model under the chaotic-maps based computational Diffie-Hellman assumption. In addition, we analyzed our protocol using BAN logic model. We also compared our protocol with Lee et al.'s protocol in aspects of computation cost, functionalities and securities.
引用
收藏
页码:569 / 597
页数:29
相关论文
共 50 条
[31]   An improved and secure chaotic map based authenticated key agreement in multi-server architecture [J].
Irshad, Azeem ;
Sher, Muhammad ;
Chaudhry, Shehzad Ashraf ;
Xie, Qi ;
Kumari, Saru ;
Wu, Fan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (01) :1167-1204
[32]   Distributed utility based User Authentication protocol for multi-server environment with key agreement utility [J].
Anand, Darpan ;
Khemchandani, Vineeta .
2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, :415-420
[33]   An extended chaotic-maps-based protocol with key agreement for multiserver environments [J].
Lee, Cheng-Chi ;
Lou, Der-Chyuan ;
Li, Chun-Ta ;
Hsu, Che-Wei .
NONLINEAR DYNAMICS, 2014, 76 (01) :853-866
[34]   A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps [J].
Tan, Zuowen .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) :1384-1397
[35]   An efficient and secure design of multi-server authenticated key agreement protocol [J].
Irshad, Azeem ;
Naqvi, Husnain ;
Chaudhry, Shehzad Ashraf ;
Raheem, Shouket ;
Kumari, Saru ;
Kanwal, Ambrina ;
Usman, Muhammad .
JOURNAL OF SUPERCOMPUTING, 2018, 74 (09) :4771-4797
[36]   An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity [J].
Li, Chun-Ta ;
Lee, Cheng-Chi ;
Weng, Chi-Yao ;
Fan, Chun-I .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (01) :119-131
[37]   A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps [J].
Zhu, Hongfeng ;
Hao, Xin .
NONLINEAR DYNAMICS, 2015, 81 (1-2) :311-321
[38]   A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme [J].
Irshad, Azeem ;
Sher, Muhammad ;
Nawaz, Omer ;
Chaudhry, Shehzad Ashraf ;
Khan, Imran ;
Kumari, Saru .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) :16463-16489
[39]   An improved authentication protocol-based dynamic identity for multi-server environments [J].
Cui, Jianming ;
Zhang, Xiaojun ;
Cao, Ning ;
Zhang, Dexue ;
Ding, Jianrui ;
Li, Guofu .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (05)
[40]   A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card [J].
Tsai, Jia-Lun ;
Lo, Nai-Wei .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (13) :1955-1963