Skip to main content
Erschienen in: Wireless Personal Communications 3/2017

03.02.2017

A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme

verfasst von: Lidong Han, Qi Xie, Wenhao Liu, Shengbao Wang

Erschienen in: Wireless Personal Communications | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In order to provide secure remote access control, a robust and efficient authentication protocol should achieve mutual authentication and session key agreement between clients and the server over public channels. Recently, Wang et al. proposed a password based authentication protocol using chaotic maps. In this paper, we demonstrate the security of their scheme, and show that Wang et al.’s scheme cannot provide session key agreement and is insecure against denial of service attack for no detecting wrong password in password change. To remedy these issues, we use the techniques of fuzzy extractor and chaotic maps to propose a three-factor remote authentication scheme. The new scheme preserves user privacy and is secure against various attacks. Detailed analysis of previous schemes in efficiency and security shows our proposed scheme is more suitable for practical application.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Arshad, H., & Nikooghadam, M. (2014). Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 38, 136.CrossRef Arshad, H., & Nikooghadam, M. (2014). Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 38, 136.CrossRef
2.
Zurück zum Zitat Burnett, A., Byrne, F., Dowling, T., & Duffy, A. (2007). A biometric identity based signature scheme. International Journal of Network Security, 5(3), 317–326. Burnett, A., Byrne, F., Dowling, T., & Duffy, A. (2007). A biometric identity based signature scheme. International Journal of Network Security, 5(3), 317–326.
3.
Zurück zum Zitat Chen, H. M., Lo, J. W., & Yeh, C. K. (2012). An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. Journal of Medical Systems, 36(6), 3907–3915.CrossRef Chen, H. M., Lo, J. W., & Yeh, C. K. (2012). An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. Journal of Medical Systems, 36(6), 3907–3915.CrossRef
4.
Zurück zum Zitat Das, M. L., Saxana, A., & Gulati, V. P. (2004). A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics, 50(2), 629–631.CrossRef Das, M. L., Saxana, A., & Gulati, V. P. (2004). A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics, 50(2), 629–631.CrossRef
5.
Zurück zum Zitat Dodis, Y., Reyzin, L., & Smith, A. (2004). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Proceedings of the advances in cryptology (Eurocrypt’04), LNCS 3027 (pp. 523–540). Dodis, Y., Reyzin, L., & Smith, A. (2004). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Proceedings of the advances in cryptology (Eurocrypt’04), LNCS 3027 (pp. 523–540).
6.
Zurück zum Zitat Dodis, Y., Ostrovsky, R., Reyzin, L., & Smith, A. (2008). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1), 97–139.MathSciNetCrossRefMATH Dodis, Y., Ostrovsky, R., Reyzin, L., & Smith, A. (2008). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1), 97–139.MathSciNetCrossRefMATH
7.
Zurück zum Zitat Guo, C., & Chang, C. C. (2013). Chaotic maps-based passwordauthenticated key agreement using smart cards. Communications in Nonlinear Science and Numerical Simulation, 18(6), 1433–1440.MathSciNetCrossRefMATH Guo, C., & Chang, C. C. (2013). Chaotic maps-based passwordauthenticated key agreement using smart cards. Communications in Nonlinear Science and Numerical Simulation, 18(6), 1433–1440.MathSciNetCrossRefMATH
8.
Zurück zum Zitat Hao, X., Wang, J., Yang, Q., Yan, X., & Li, P. (2013). A chaotic map-based authentication scheme for telecare medicine information systems. Journal of Medical Systems, 37(2), 9919.CrossRef Hao, X., Wang, J., Yang, Q., Yan, X., & Li, P. (2013). A chaotic map-based authentication scheme for telecare medicine information systems. Journal of Medical Systems, 37(2), 9919.CrossRef
9.
Zurück zum Zitat He, D. B., Chen, J. H., & Zhang, R. (2012). A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36, 1989–1995.CrossRef He, D. B., Chen, J. H., & Zhang, R. (2012). A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36, 1989–1995.CrossRef
10.
Zurück zum Zitat Hwang, M. S., & Li, L. H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28–30.CrossRef Hwang, M. S., & Li, L. H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28–30.CrossRef
11.
Zurück zum Zitat Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2014). Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. Journal of Medical Systems, 38(2), 1–8.CrossRef Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2014). Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. Journal of Medical Systems, 38(2), 1–8.CrossRef
12.
Zurück zum Zitat Kocarev, L., & Lian, S. (2011). Chaos-based cryptography: Theory, algorithms and applications. Berlin: Springer.CrossRefMATH Kocarev, L., & Lian, S. (2011). Chaos-based cryptography: Theory, algorithms and applications. Berlin: Springer.CrossRefMATH
13.
Zurück zum Zitat Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Advances in cryptology—CRYPTO’99 (pp. 388–397). Springer. Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Advances in cryptology—CRYPTO’99 (pp. 388–397). Springer.
14.
Zurück zum Zitat Kohda, T., Tsuneda, A., & Lawrance, A. J. (2000). Correlational properties of Chebyshev chaotic sequences. Journal of Time Series Analysis, 21(2), 181–191.MathSciNetCrossRefMATH Kohda, T., Tsuneda, A., & Lawrance, A. J. (2000). Correlational properties of Chebyshev chaotic sequences. Journal of Time Series Analysis, 21(2), 181–191.MathSciNetCrossRefMATH
15.
Zurück zum Zitat Kumari, S., & Khan, M. K. (2013). More secure smart card based remote user password authentication scheme with user anonymity. Security and Communication Networks, 7, 2039–2053.CrossRef Kumari, S., & Khan, M. K. (2013). More secure smart card based remote user password authentication scheme with user anonymity. Security and Communication Networks, 7, 2039–2053.CrossRef
16.
Zurück zum Zitat Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.MathSciNetCrossRef Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.MathSciNetCrossRef
17.
Zurück zum Zitat Lee, C. C., & Hsu, C. W. (2013). A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dynamics, 71, 201–211.MathSciNetCrossRef Lee, C. C., & Hsu, C. W. (2013). A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dynamics, 71, 201–211.MathSciNetCrossRef
18.
Zurück zum Zitat Li, X., Wen, Q., Li, W., Zhang, H., & Jin, Z. (2014). Secure privacypreserving biometric authentication scheme for telecare medicine information systems. Journal of Medical Systems, 38(11), 139.CrossRef Li, X., Wen, Q., Li, W., Zhang, H., & Jin, Z. (2014). Secure privacypreserving biometric authentication scheme for telecare medicine information systems. Journal of Medical Systems, 38(11), 139.CrossRef
20.
Zurück zum Zitat Lin, H. Y. (2013). Chaotic map based mobile dynamic ID authenticaed key agreement scheme. Wireless Personal Communications., 37(2), 1–5. Lin, H. Y. (2013). Chaotic map based mobile dynamic ID authenticaed key agreement scheme. Wireless Personal Communications., 37(2), 1–5.
21.
Zurück zum Zitat Lu, Y., Li, L., Peng, H., & Yang, Y. (2015). An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. Journal of Medical Systems, 39, 32.CrossRef Lu, Y., Li, L., Peng, H., & Yang, Y. (2015). An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. Journal of Medical Systems, 39, 32.CrossRef
22.
Zurück zum Zitat Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smartcard security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.MathSciNetCrossRef Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smartcard security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.MathSciNetCrossRef
23.
Zurück zum Zitat Wang, Z., Huo, Z., & Shi, W. (2015). A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems. Journal of Medical Systems, 39, 158.CrossRef Wang, Z., Huo, Z., & Shi, W. (2015). A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems. Journal of Medical Systems, 39, 158.CrossRef
24.
Zurück zum Zitat Wei, J., Hu, X., & Liu, W. (2012). An improved authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(6), 3597–3604.CrossRef Wei, J., Hu, X., & Liu, W. (2012). An improved authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(6), 3597–3604.CrossRef
25.
Zurück zum Zitat Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., & Chung, Y. (2012). A secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36, 1529–1535.CrossRef Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., & Chung, Y. (2012). A secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36, 1529–1535.CrossRef
26.
Zurück zum Zitat Xiao, D., Liao, X., & Deng, S. (2005). One-way hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons & Fractals, 241, 65–71.MathSciNetCrossRefMATH Xiao, D., Liao, X., & Deng, S. (2005). One-way hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons & Fractals, 241, 65–71.MathSciNetCrossRefMATH
27.
Zurück zum Zitat Xiao, D., Liao, X., & Wong, K. (2005). An efficient entire chaos based scheme for deniable authentication. Chaos, Solitons & Fractals, 23, 1327–1331.CrossRefMATH Xiao, D., Liao, X., & Wong, K. (2005). An efficient entire chaos based scheme for deniable authentication. Chaos, Solitons & Fractals, 23, 1327–1331.CrossRefMATH
Metadaten
Titel
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme
verfasst von
Lidong Han
Qi Xie
Wenhao Liu
Shengbao Wang
Publikationsdatum
03.02.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4003-z

Weitere Artikel der Ausgabe 3/2017

Wireless Personal Communications 3/2017 Zur Ausgabe

Neuer Inhalt