A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security

被引:45
作者
Li, Xiong [1 ,2 ]
Niu, Jianwei [2 ]
Kumari, Saru [3 ]
Islam, S. K. Hafizul [4 ]
Wu, Fan [5 ]
Khan, Muhammad Khurram [6 ]
Das, Ashok Kumar [7 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[3] Ch Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[4] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani Campus, Pilani 333031, Rajasthan, India
[5] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[6] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[7] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
User authentication; Chaotic maps; Session key agreement; Smart card; Multi-server environments; PASSWORD AUTHENTICATION; SMART-CARD; SCHEME; CRYPTANALYSIS; EFFICIENT; IMPROVEMENT; IDENTITY; PRIVACY;
D O I
10.1007/s11277-016-3293-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The widespread popularity of the computer networks has triggered concerns about information security. Password-based user authentication with key agreement protocols have drawn attentions since it provides proper authentication of a user before granting access right to services, and then ensure secure communication over insecure channels. Recently, Lee et al. pointed out different security flaws on Tsaur et al.'s multi-server user authentication protocol, and they further proposed an extended chaotic maps-based user authentication with key agreement protocol for multi-server environments. However, we observed that Lee et al.'s protocol has some functionality and security flaws, i.e., it is inefficient in detection of unauthorized login and it does not support password change mechanism. Besides, their protocol is vulnerable to registration center spoofing attack and server spoofing attack. In order to remedy the aforementioned flaws, we proposed a novel chaotic maps-based user authentication with key agreement protocol for multi-server environments. The proposed protocol is provably secure in the random oracle model under the chaotic-maps based computational Diffie-Hellman assumption. In addition, we analyzed our protocol using BAN logic model. We also compared our protocol with Lee et al.'s protocol in aspects of computation cost, functionalities and securities.
引用
收藏
页码:569 / 597
页数:29
相关论文
共 50 条
[41]   Provable user authentication scheme on ECC in multi-server environment [J].
Toan-Thinh Truong ;
Minh-Triet Tran ;
Anh-Duc Duong ;
Phuong-Nam Nguyen-Pham ;
Nguyen, Hoang-Anh ;
Nguyen, Trong-Nguyen .
JOURNAL OF SUPERCOMPUTING, 2023, 79 (01) :725-761
[42]   MSAUPL: A multi-server authentication and key agreement protocol for industrial IoT based on user privacy level [J].
Wu, Yi ;
Feng, Tao ;
Su, Chunhua ;
Liu, Chunyan .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
[43]   A new three-factor authentication and key agreement protocol for multi-server environment [J].
Sudhakar, T. ;
Natarajan, V. .
WIRELESS NETWORKS, 2020, 26 (07) :4909-4920
[44]   A Novel Three-Factor Authentication Scheme with High Security for Multi-Server Environments [J].
Chen, Rui ;
Mou, Yongcong ;
Zhang, Min .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (01) :763-781
[45]   Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment [J].
Toan-Thinh Truong ;
Minh-Triet Tran ;
Anh-Duc Duong ;
Echizen, Isao .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) :2785-2801
[46]   A chaotic maps-based authenticated key agreement protocol with strong anonymity [J].
Zuowen Tan .
Nonlinear Dynamics, 2013, 72 :311-320
[47]   A Novel Multi-server Environment Authentication Protocol [J].
Li Haixia ;
Lu Chuiwei ;
Sun Sheng .
PROCESSING OF 2014 INTERNATIONAL CONFERENCE ON MULTISENSOR FUSION AND INFORMATION INTEGRATION FOR INTELLIGENT SYSTEMS (MFI), 2014,
[48]   Improved chaotic maps-based password-authenticated key agreement using smart cards [J].
Lin, Han-Yu .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 20 (02) :482-488
[49]   An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment [J].
Yu, Yicheng ;
Taylor, Oliver ;
Li, Rui ;
Sunagawa, Baiho .
MATHEMATICS, 2021, 9 (08)
[50]   On the security of a novel key agreement protocol based on chaotic maps [J].
Xiang, Tao ;
Wong, Kwok-Wo ;
Liao, Xiaofeng .
CHAOS SOLITONS & FRACTALS, 2009, 40 (02) :672-675