Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card

被引:5
作者
Meshram, Chandrashekhar [1 ]
Meshram, Sarita Gajbhiye [2 ]
Ibrahim, Rabha W. [3 ]
Jalab, Hamid A. [4 ]
Jamal, Sajjad Shaukat [5 ]
Barve, Sharad Kumar [2 ]
机构
[1] Coll Chhindwara Univ, Jaywanti Haksar Govt Postgrad Coll, Dept Post Grad Studies & Res Math, Betul 480001, India
[2] Water Resources & Appl Math Res Lab, Nagpur, Maharashtra, India
[3] IEEE 94086547, Kuala Lumpur 59200, Malaysia
[4] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Multimedia Unit, Kuala Lumpur 50603, Malaysia
[5] King Khalid Univ, Coll Sci, Dept Math, Abha, Saudi Arabia
关键词
Mutual authentication; Smart card; Session key; Conformable chaotic map; Fractional calculus; Conformable calculus; Perfect forward secrecy; Hash function; Cryptography; KEY-EXCHANGE; CRYPTANALYSIS; ANONYMITY; SECURITY;
D O I
10.1007/s40747-021-00555-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid advancement and growth of computer networks, there have been greater and greater demands for remote user password authentication protocols. In current ages, smartcard-based authentication protocol has formed the standard with their incredibly insubstantial, user-friendly equipment and low-cost apps. In this study, we proposed an effective robust authentication protocol using the conformable chaotic map, where a conformable calculus is a branch of newly appearing fractional calculus. It has a magnificent property, because it formulates using a controller term. We shall also offer formal proof of smooth execution of the proposed authenticated protocol. Our new protocol is more secure as compared to several comparable protocols.
引用
收藏
页码:973 / 987
页数:15
相关论文
共 52 条
  • [1] A new Identity Based Encryption (IBE) scheme using extended Chebyshev polynomial over finite fields Zp
    Algehawi, Mohammed Benasser
    Samsudin, Azman
    [J]. PHYSICS LETTERS A, 2010, 374 (46) : 4670 - 4674
  • [2] Anderson DR, 2018, ARXIV PREPRINT ARXIV
  • [3] [Anonymous], 2010, P 3 ANN ACM BANG C C
  • [4] [Anonymous], 1993, THESIS U MISSOURI RO
  • [5] A novel shuffling technique based on fractional chaotic maps
    Bai, Yun-Ru
    Baleanu, Dumitru
    Wu, Guo-Cheng
    [J]. OPTIK, 2018, 168 : 553 - 562
  • [6] Security of public-key cryptosystems based on Chebyshev polynomials
    Bergamo, P
    D'Arco, P
    De Santis, A
    Kocarev, L
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) : 1382 - 1393
  • [7] BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
  • [8] Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
  • [9] Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
  • [10] A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards
    Chang, Chin-Chen
    Cheng, Ting-Fang
    Hsueh, Wei-Yuan
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (02) : 290 - 306