Online citations, reference lists, and bibliographies.
Please confirm you are human
(Sign Up for free to never see this)
← Back to Search

A Novel Chaotic Maps-Based User Authentication And Key Agreement Protocol For Multi-server Environments With Provable Security

X. Li, Jianwei Niu, S. Kumari, S. H. Islam, F. Wu, M. Khan, A. K. Das
Published 2016 · Computer Science

Save to my Library
Download PDF
Analyze on Scholarcy
Share
The widespread popularity of the computer networks has triggered concerns about information security. Password-based user authentication with key agreement protocols have drawn attentions since it provides proper authentication of a user before granting access right to services, and then ensure secure communication over insecure channels. Recently, Lee et al. pointed out different security flaws on Tsaur et al.’s multi-server user authentication protocol, and they further proposed an extended chaotic maps-based user authentication with key agreement protocol for multi-server environments. However, we observed that Lee et al.’s protocol has some functionality and security flaws, i.e., it is inefficient in detection of unauthorized login and it does not support password change mechanism. Besides, their protocol is vulnerable to registration center spoofing attack and server spoofing attack. In order to remedy the aforementioned flaws, we proposed a novel chaotic maps-based user authentication with key agreement protocol for multi-server environments. The proposed protocol is provably secure in the random oracle model under the chaotic-maps based computational Diffie-Hellman assumption. In addition, we analyzed our protocol using BAN logic model. We also compared our protocol with Lee et al.’s protocol in aspects of computation cost, functionalities and securities.
This paper references
10.1016/J.CNSNS.2011.11.025
Security improvement on an anonymous key agreement protocol based on chaotic maps
K. Xue (2012)
10.1016/J.CHAOS.2006.09.047
Cryptanalysis of the public key encryption based on multiple chaotic systems
L. Zhang (2008)
10.1587/TRANSCOM.E95.B.619
A Smartcard-Based User Authentication Scheme to Ensure the PFS in Multi-Server Environments
Yun-Seok Lee (2012)
10.1016/j.csi.2008.09.006
An improved smart card based password authentication scheme with provable security
J. Xu (2009)
10.1109/TCE.2004.1277870
Efficient multi-server password authenticated key agreement using smart cards
W. Juang (2004)
10.1002/dac.2708
On the security of a dynamic identity-based remote user authentication scheme with verifiable password update
Y. Liu (2015)
10.1016/j.csi.2008.11.002
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
H. Hsiang (2009)
10.1016/j.csi.2007.10.007
A secure dynamic ID based remote user authentication scheme for multi-server environment
Yi-Pin Liao (2009)
10.1016/j.future.2012.03.017
A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients
Yi-Pin Liao (2013)
10.1016/S0167-739X(02)00093-6
A new remote user authentication scheme for multi-server architecture
I. Lin (2003)
10.1016/j.eswa.2011.04.190
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards
C. Lee (2011)
10.1109/TIT.1983.1056650
On the security of public key protocols
D. Dolev (1981)
10.1016/j.jnca.2011.11.009
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
X. Li (2012)
10.1016/0020-0190(95)00087-S
Password Authentication Without Using a Password Table
G. Horng (1995)
10.1587/TRANSCOM.E95.B.3052
Cryptanalysis of a Smartcard-Based User Authentication Scheme for Multi-Server Environments
D. He (2012)
10.1155/2012/454823
Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol
H. Lai (2012)
10.1145/77648.77649
A logic of authentication
M. Burrows (1990)
10.1007/s11227-010-0512-1
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
E. Yoon (2010)
10.1002/dac.2552
Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update
Y. Chang (2014)
10.1007/S11071-013-1174-3
An extended chaotic-maps-based protocol with key agreement for multiserver environments
C. Lee (2014)
10.1016/j.cose.2008.04.001
Efficient multi-server authentication scheme based on one-way hash function without verification table
Jia-Lun Tsai (2008)
10.1007/S11071-012-0335-0
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
D. He (2012)
10.1145/168588.168596
Random oracles are practical: a paradigm for designing efficient protocols
M. Bellare (1993)
10.1007/S11071-013-1020-7
Chaotic maps-based three-party password-authenticated key agreement scheme
Qi Xie (2013)
10.1145/358790.358797
Password authentication with insecure communication
L. Lamport (1981)
10.1016/j.mcm.2012.06.033
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
X. Li (2013)
10.1007/S11071-013-0979-4
Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
Fengjun Zhao (2013)
10.1016/j.jnca.2010.11.011
A secure dynamic identity based authentication protocol for multi-server architecture
S. Sood (2011)
10.1109/CW.2004.17
An efficient and secure multi-server password authentication scheme using smart cards
C. Chang (2004)
10.1109/JSYST.2014.2301517
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
D. He (2015)
(IEEE Transactions on Neural Networks,12(6):1498-1504)A Remote Password Authentication Scheme for Multi-Server Architecture Using Neural Network
L. H. Li (2001)
10.1016/j.jnca.2010.09.003
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
X. Li (2011)
10.1016/j.comnet.2010.08.008
Provable secure authentication protocol with anonymity for roaming service in global mobility networks
Tao Zhou (2011)
Comments on four multi-server authentication protocols using smart card
J. Chou (2012)
10.1016/j.jnca.2013.02.034
An enhanced smart card based remote user password authentication scheme
X. Li (2013)
10.1016/j.csi.2004.03.004
A smart card-based remote scheme for password authentication in multi-server Internet services
W. Tsaur (2004)
10.1007/S11071-011-0247-4
An extended chaotic maps-based key agreement protocol with user anonymity
C. Lee (2012)
10.1007/978-3-642-20542-2
Chaos-Based Cryptography - Theory, Algorithms and Applications
L. Kocarev (2011)
10.1007/s00530-013-0346-9
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D. He (2013)
10.1016/j.amc.2004.11.033
An enhanced user authentication scheme for multi-server Internet services
W. Tsaur (2005)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.1016/j.jss.2011.10.049
An efficient and secure multi-server authentication scheme with key agreement
W. Tsaur (2012)
10.1007/0-387-23483-7_394
Side-Channel Analysis
M. Joye (2005)
Cryptanalysis of the public key encryption based on multiple chaotic systems
L. H. Zhang (2008)
10.1016/j.ins.2015.02.010
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D. He (2015)
10.6633/IJNS.200609.3(2).01
Password Authentication Schemes: Current Status and Key Issues
C. Tsai (2006)
10.1016/S0164-1212(98)00006-5
"Paramita wisdom" password authentication scheme without verification tables
J. Jan (1998)
10.1002/dac.2676
Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update
X. Li (2015)
Sequences of games: a tool for taming complexity in security proofs
V. Shoup (2004)
10.1016/j.comcom.2010.04.005
Robust authentication and key agreement scheme preserving the privacy of secret key
Ren-Chiun Wang (2011)
10.1007/S11071-013-1029-Y
An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
C. Li (2013)
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
D. He (2011)
10.1007/3-540-48405-1_25
Differential Power Analysis
Paul C. Kocher (1999)



This paper is referenced by
10.1007/s12652-018-0710-x
Provably secure anonymous three-factor authentication scheme for multi-server environments
Dongqing Xu (2019)
10.1007/S13369-017-2764-Z
An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture
A. Irshad (2018)
10.1155/2020/3579705
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment Polynomial-Based Authentication Scheme
T. Truong (2020)
10.1007/978-981-15-3817-9
Secure Knowledge Management In Artificial Intelligence Era: 8th International Conference, SKM 2019, Goa, India, December 21–22, 2019, Proceedings
Phoebe Beverly Chen (2020)
10.1109/JSYST.2018.2838450
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre
A. Irshad (2019)
10.1371/journal.pone.0187403
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments
H. Guo (2017)
10.1007/s11042-017-5078-y
A secure mutual authenticated key agreement of user with multiple servers for critical systems
A. Irshad (2017)
10.1007/S40009-019-00813-1
An Improved Server Validation Scheme for Multi-server Infrastructure
H. Monga (2020)
Partially blind signature scheme based on chaotic maps and factoring problems
Nedal Tahat (2018)
10.1007/s10916-016-0590-6
A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems
Hu Xiong (2016)
10.2139/ssrn.3345110
An improved lightweight privacy preserving authentication scheme for SIP-based-VOIP using smart card 1
Saeed Ullah Jan (2017)
10.1016/j.comcom.2018.06.005
Provably secure group authentication and key agreement for machine type communication using Chebyshev's polynomial
Probidita Roychoudhury (2018)
10.1007/s11042-016-4236-y
An improved and secure chaotic map based authenticated key agreement in multi-server architecture
A. Irshad (2016)
10.1109/SPIN.2019.8711751
A Secure Biometric Based User Authentication Scheme for Multi-Server Environment Using Chaotic Map
Shreeya Swagatika Sahoo (2019)
10.1007/S13369-017-2665-1
Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment
R. Ali (2017)
10.1007/s11227-018-2467-6
An efficient and secure design of multi-server authenticated key agreement protocol
A. Irshad (2018)
10.1002/ett.3200
Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment
Preeti Chandrakar (2017)
10.1002/sec.1653
An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design
Tanmoy Maitra (2016)
10.1002/dac.3904
Efficient privacy-preserving authentication scheme for roaming consumer in global mobility networks
Arezou Ostad-Sharif (2019)
10.1007/978-981-15-3817-9_6
Secure and Energy-Efficient Key-Agreement Protocol for Multi-server Architecture
Trupil Limbasiya (2019)
10.1007/s11761-020-00307-9
Modified Chebyshev polynomial-based access control mechanism for secured data access in cloud computing environment
J. V. B. Benifa (2020)
10.1109/ACCESS.2020.3043621
A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications
M. Bhattacharya (2020)
10.1002/dac.3351
An improved lightweight multiserver authentication scheme
A. Irshad (2017)
10.1109/TENCON.2019.8929338
Chaotic Map based Privacy Preservation User Authentication Scheme for WBANs
Shreeya Swagatika Sahoo (2019)
10.1109/ACCESS.2020.2993921
Secure Digital Certificate-Based Data Access Control Scheme in Blockchain
B. Liu (2020)
10.1109/ACCESS.2017.2652486
Hierarchical Trust Level Evaluation for Pervasive Social Networking
Jian Shen (2017)
10.1002/dac.3734
An efficient and secure 3-factor user-authentication protocol for multiserver environment
M. Luo (2018)
Semantic Scholar Logo Some data provided by SemanticScholar