Provably Secure Anonymous Single-Sign-On Authentication Mechanisms Using Extended Chebyshev Chaotic Maps for Distributed Computer Networks

被引:38
作者
Lee, Tian-Fu [1 ]
机构
[1] Tzu Chi Univ, Dept Med Informat, Hualien 97004, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2018年 / 12卷 / 02期
关键词
Anonymity; authentication; chaotic map; key distribution; network communication; KEY AGREEMENT PROTOCOL; EFFICIENT USER IDENTIFICATION; GLOBAL MOBILITY NETWORK; SMART CARDS; SCHEME; EXCHANGE; HASH;
D O I
10.1109/JSYST.2015.2471095
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Single-sign-on authentication mechanisms enable a legal user to access various service providers efficiently and conveniently by using a unitary token. These mechanisms are widely used in distributed computer networks. This investigation proposes an efficient and secure single-sign-on authentication scheme that uses extended chaotic maps, exhibits operations that satisfy the semigroup property and commutative under composition, and has a higher efficiency than modular exponential computations and scalar multiplications on the elliptic curve. The session key security of the proposed scheme is based on Chebyshev chaotic-map-based assumptions, and the scheme is proven to be secure using the real-or-random model. The proposed authentication scheme retains the security properties of earlier schemes, requires fewer transmissions, has a lower computational cost, and uses fewer variables; it is therefore efficient in computation and communication.
引用
收藏
页码:1499 / 1505
页数:7
相关论文
共 46 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3376, P191
[3]  
[Anonymous], 2005, SEQUENCES GAMES TOOL
[4]  
Bellare M, 2000, P ADV CRYPT EUR 2000, P122
[5]   Security of public-key cryptosystems based on Chebyshev polynomials [J].
Bergamo, P ;
D'Arco, P ;
De Santis, A ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) :1382-1393
[6]  
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[7]   A Secure Single Sign-On Mechanism for Distributed Computer Networks [J].
Chang, Chin-Chen ;
Lee, Chia-Yin .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (01) :629-637
[8]   Authenticated RFID security mechanism based on chaotic maps [J].
Cheng, Zi-Yao ;
Liu, Yun ;
Chang, Chin-Chen ;
Chang, Shih-Chang .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) :247-256
[9]   Practical anonymous user authentication scheme with security proof [J].
Chien, Hung-Yu .
COMPUTERS & SECURITY, 2008, 27 (5-6) :216-223
[10]   TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS [J].
DENNING, DE ;
SACCO, GM .
COMMUNICATIONS OF THE ACM, 1981, 24 (08) :533-536