Skip to main content
Log in

A provable privacy-protection system for multi-server environment

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

The paper firstly proposed a provable privacy-protection system (PPPS) which can achieve two kinds of privacy protection and switch between them optionally by users: The first is anonymous scheme which can make nobody know the users’ identity, including the server and the registration center (RC), and they only know these users are legal or paying members. The other is hiding identity scheme which owns also privacy-protection property, because the user’s identity is not transferred during the process of the proposed protocol, and only the server and the RC know the user’s identity. About practical environment, we adopt multi-server architecture which can allow the user to register at the RC once and can access all the permitted services provided by the eligible servers. Then a new PPPS authenticated key agreement protocol is given based on chaotic maps. Security of the scheme is based on chaotic maps hard problems, a secure one-way hash function and a secure symmetric cryptosystem. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally we give the security proof and the efficiency analysis of our proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. The Onion Router, an anonymous Internet communication system.

References

  1. Katz, J., MacKenzie, P., Taban, G., Gligor, V.: Two-server password-only authenticated key exchange. Appl. Cryptogr. Netw. Secur. 3531, 1–16 (2005)

    Article  MATH  Google Scholar 

  2. Zhu, H.: A provable one-way authentication key agreement scheme with user anonymity for multi-server environment. KSII Trans. Internet Inf. Syst. 9(2), 811–829 (2015)

    Article  Google Scholar 

  3. Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240(1), 50–54 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  4. Lee, C., Li, C., Hsu, C.: A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn 73, 125–132 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  5. Bresson, E., Chevassut, O., Pointcheval, D.: Group Diffie-Hellman key exchange secure against dictionary attack. Asiacrypt 2501, 497–514 (2002)

    MathSciNet  MATH  Google Scholar 

  6. Li, H., Wu, C.-K., Sun, J.: A general compiler for password-authenticated group key exchange protocol. Inf. Process. Lett. 110, 160–167 (2010)

  7. Wu, T.Y., Tseng, Y.M., Tsai, T.T.: A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants. Comput. Netw. 56(12), 2994–3006 (2012)

    Article  Google Scholar 

  8. Tseng, H., Jan, R., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International Conference on Communications ( ICC09), pp. 1–6, (2009)

  9. Di Raimondo, M., Gennaro, R.: Provably secure threshold password-authenticated key exchange. J. Comput. Syst. Sci. 72(6), 978–1001 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  10. Khan, M.K., Zhang, J.: Improving the security of a flexible biometrics remote user authentication scheme. Comput. Stand Interfaces 29(1), 82–85 (2007)

    Article  Google Scholar 

  11. Li, L.H., Lin, I.C., Hwang, M.S.: A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans. Neural Netw. 12(6), 1498–1504 (2001)

    Article  Google Scholar 

  12. Lin, I.C., Hwang, M.S., Li, L.H.: A new remote user authentication scheme for multi-server architecture. Future Gener. Comput. Syst. 19(1), 13–22 (2003)

    Article  MATH  Google Scholar 

  13. Tsai, J.L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3–4), 115–121 (2008)

    Article  Google Scholar 

  14. Ravi, S.P., Jaidhar, C.D., Shashikala, T.: Robust smart card authentication scheme for multi-server architecture. Wirel. Pers. Commun. 72(1), 729–745 (2013)

    Article  Google Scholar 

  15. Goldberg, I.: On the security of the tor authentication protocol. In: Danezis, G., Golle, P. (eds.) Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006. Revised Selected Papers, vol. 4258, pp. 316–331. Springer, Berlin (2006)

  16. Kate, A., Zaverucha, G.M., Goldberg, I.: Pairing-based onion routing with improved forward secrecy. ACM Trans. Inf. Syst. Secur. 13(4), 29 (2010)

    Article  Google Scholar 

  17. Morrissey, P., Smart, N.P., Warinschi, B.: A modular security analysis of the TLS handshake protocol. Adv. Cryptol. Proc. 5350, 55–73 (2008)

    MathSciNet  MATH  Google Scholar 

  18. Goldberg, I., Stebila, D., Ustaoglu, B.: Anonymity and one-way authentication in key exchange protocols. Des. Codes Cryptogr. 67, 245–269 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  19. Dierks, T., Allen, C.: The TLS protocol version 1.0, (1999). http://www.ietf.org/rfc/rfc2246.txt RFC 2246

  20. NIST National Institute of Standards and Technology, Special Publication 800–56B, Recommendation for pair-wise key establishment schemes using integer factorization cryptography. http://csrc.nist.gov/publications/PubsSPs.html (2009)

  21. Wang, X., Zhao, J.: An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15, 4052–4057 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  22. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669–674 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  23. Kocarev, L., Lian, S. (eds.): Chaos-based cryptography: Theory, algorithms and applications. In: Studies in Computational Intelligence, vol. 354, pp. 53–54. Springer, Berlin (2011)

  24. Ravi, S.P., Jaidhar, C.D., Shashikala, T.: Robust smart card authentication scheme for multi-server architecture. Wirel. Pers. Commun. 72, 729–745 (2013)

    Article  Google Scholar 

  25. Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. EUROCRYPT, Vol. 2045 of Lecture Notes in Computer Science. pp. 453–474, (2001)

  26. Chen, T.-Y., Lee, C.-C., Hwang, M.-S., Jan, J.-K.: Towards secure and efficient user authentication scheme using smart card for multi-server environments. J. Supercomput. 66(2), 1008–1032 (2013)

    Article  Google Scholar 

  27. Tsai, J.L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3–4), 115–121 (2008)

    Article  Google Scholar 

  28. Liao, Y.P., Wang, S.S.: A secure dynamic ID based remote user authentication scheme for multiserver environment. Comput. Stand Interfaces 31(1), 24–29 (2009)

    Article  Google Scholar 

  29. Hsiang, H.C., Shih, W.K.: Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand Interfaces 31(6), 1118–1123 (2009)

    Article  Google Scholar 

  30. Ying-Qian, Z., Xing-Yuan, W.: A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf. Sci. 273, 329–351 (2014)

    Article  Google Scholar 

  31. Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simulat. 16, 1986–1992 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  32. Wang, X., Luan, D., Bao, X.: Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digital Signal Process. 25, 244–247 (2014)

  33. Wang, X., Luan, D.: A secure key agreement protocol based on chaotic maps. Chin. Phys. B 22(11), 110503 (2013)

  34. Wang, X., Luan, D.: A novel image encryption algorithm using chaos and reversible cellular automata. Commun. Nonlinear Sci. Numer. Simul. 18, 3075–3085 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  35. Xing-yuan, W., Yong-feng, G.: A switch-modulated method for chaos digital secure communication based on user-defined protocol. Commun. Nonlinear Sci. Numer. Simul. 15, 99–104 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongfeng Zhu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhu, H. A provable privacy-protection system for multi-server environment. Nonlinear Dyn 82, 835–849 (2015). https://doi.org/10.1007/s11071-015-2198-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-015-2198-7

Keywords

Navigation