Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps

被引:9
作者
Lee, Tian-Fu [1 ,2 ]
Hsiao, Chia-Hung [1 ]
Hwang, Shi-Han [1 ]
Lin, Tsung-Hung [3 ]
机构
[1] Tzu Chi Univ, Dept Med Informat, Hualien, Taiwan
[2] Tzu Chi Univ, Inst Med Sci, Dept Med Informat, Hualien, Taiwan
[3] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung, Taiwan
来源
PLOS ONE | 2017年 / 12卷 / 07期
关键词
REMOTE USER AUTHENTICATION; SCHEME; SECURE; PROTOCOL; EFFICIENT; EXCHANGE; ROBUST;
D O I
10.1371/journal.pone.0181744
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.
引用
收藏
页数:20
相关论文
共 51 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] Abdalla M, 2005, LECT NOTES COMPUT SC, V3376, P191
  • [3] [Anonymous], 2013, J. Med. Syst.
  • [4] [Anonymous], 2005, SEQUENCES GAMES TOOL
  • [5] Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution
    Aslan, HK
    [J]. COMPUTERS & SECURITY, 2004, 23 (04) : 290 - 299
  • [6] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
  • [7] Security of public-key cryptosystems based on Chebyshev polynomials
    Bergamo, P
    D'Arco, P
    De Santis, A
    Kocarev, L
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) : 1382 - 1393
  • [8] Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
  • [9] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13
  • [10] Buttyan L, 1998, P 11 IEEE COMP SEC F