An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture

被引:0
|
作者
Azeem Irshad
Shehzad Ashraf Chaudhry
Qi Xie
Xiong Li
Mohammad Sabzinejad Farash
Saru Kumari
Fan Wu
机构
[1] International Islamic University,Department of Computer Science and Software Engineering
[2] Hangzhou Normal University,Hangzhou Key Laboratory of Cryptography and Network Security
[3] Hunan University of Science and Technology,Faculty of Mathematical Sciences and Computer
[4] Kharazmi University,undefined
[5] Chaudhary Charan Singh University,undefined
[6] Xiamen Institute of Technology,undefined
关键词
Multi-server authentication; Chebyshev chaotic map; Cryptography; Authentication; Attacks;
D O I
暂无
中图分类号
学科分类号
摘要
In the multi-server authentication (MSA) paradigm, a subscriber might avail multiple services of different service providers, after registering from registration authority. In this approach, the user has to remember only a single password for all service providers, and servers are relieved of individualized registrations. Many MSA-related schemes have been presented so far, however with several drawbacks. In this connection, recently Li et al. in Wirel. Pers. Commun., (2016). doi:10.1007/s11277-016-3293-x presented a chaotic map-based multi-server authentication scheme. However, we observed that Li et al. suffer from malicious server insider attack, stolen smart card attack, and session-specific temporary information attack. This research work is based on improving security of Li et al.’s protocol in minimum possible computation cost. We also evaluate the security for the contributed work which is provable under formal security analysis employing random oracle model and BAN Logic.
引用
收藏
页码:811 / 828
页数:17
相关论文
共 50 条
  • [31] An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment
    Kumar, Ashish
    Om, Hari
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (09) : 14163 - 14189
  • [33] Provably secure authenticated tree based group key agreement
    Dutta, R
    Barua, R
    Sarkar, P
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 92 - 104
  • [34] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
    Inam ul haq
    Jian Wang
    Youwen Zhu
    Saad Maqbool
    Digital Communications and Networks, 2021, 7 (01) : 140 - 150
  • [35] Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
    Lee, Tian-Fu
    Lin, Ching-Ying
    Lin, Chun-Li
    Hwang, Tzonelih
    NONLINEAR DYNAMICS, 2015, 82 (1-2) : 29 - 38
  • [36] Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
    Tian-Fu Lee
    Ching-Ying Lin
    Chun-Li Lin
    Tzonelih Hwang
    Nonlinear Dynamics, 2015, 82 : 29 - 38
  • [37] A Privacy-Preserving Authenticated Key Agreement Scheme Based on Physically Unclonable Functions for Multi-Server Architecture
    Lee, Tian-Fu
    Chang, I-Pin
    Huang, Wei-Jie
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 3065 - 3077
  • [38] An anonymous authenticated key-agreement scheme for multi-server infrastructure
    Akram, Muhammad Arslan
    Ghaffar, Zahid
    Mahmood, Khalid
    Kumari, Saru
    Agarwal, Kadambri
    Chen, Chien-Ming
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [39] Cryptanalysis and Improvement of an Anonymous Multi-server Authenticated Key Agreement Scheme
    Kumari, Shipra
    Om, Hari
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (02) : 2513 - 2537
  • [40] An Efficient Multi-server Password Authenticated Key Agreement Scheme Revisited
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 396 - +