Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps

被引:9
|
作者
Lee, Tian-Fu [1 ,2 ]
Hsiao, Chia-Hung [1 ]
Hwang, Shi-Han [1 ]
Lin, Tsung-Hung [3 ]
机构
[1] Tzu Chi Univ, Dept Med Informat, Hualien, Taiwan
[2] Tzu Chi Univ, Inst Med Sci, Dept Med Informat, Hualien, Taiwan
[3] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung, Taiwan
来源
PLOS ONE | 2017年 / 12卷 / 07期
关键词
REMOTE USER AUTHENTICATION; SCHEME; SECURE; PROTOCOL; EFFICIENT; EXCHANGE; ROBUST;
D O I
10.1371/journal.pone.0181744
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Compliance with HIPAA and GDPR in Certificateless-Based Authenticated Key Agreement Using Extended Chaotic Maps
    Lee, Tian-Fu
    Chang, I-Pin
    Su, Guo-Jun
    ELECTRONICS, 2023, 12 (05)
  • [32] A New Client-to-Client Password-Authenticated Key Agreement Protocol
    Feng, Deng-Guo
    Xu, Jing
    CODING AND CRYPTOLOGY, PROCEEDINGS, 2009, 5557 : 63 - 76
  • [33] Password-authenticated key exchange using efficient MACs
    Strangio, Maurizio A.
    JOURNAL OF COMPUTERS, 2006, 1 (08) : 27 - 35
  • [34] Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
    Li, Xiangxue
    Qiu, Weidong
    Zheng, Dong
    Chen, Kefei
    Li, Jianhua
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (02) : 793 - 800
  • [35] Password-authenticated cluster-based group key agreement for smart grid communication
    Nicanfar, Hasen
    Leung, Victor C. M.
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (01) : 221 - 233
  • [36] Efficient password-authenticated key exchange based on RSA
    Park, Sangjoon
    Nam, Junghyun
    Kim, Seungjoo
    Won, Dongho
    TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 309 - +
  • [37] Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments
    Tsai, Jia-Lun
    Lo, Nai-Wei
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (11) : 1971 - 1978
  • [38] Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
    Islam, S. K. Hafizul
    INFORMATION SCIENCES, 2015, 312 : 104 - 130
  • [39] Provably secure threshold password-authenticated key exchange extended abstract
    Di Raimondo, M
    Gennaro, R
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 507 - 523
  • [40] An efficient three-party password-based key agreement protocol using extended chaotic maps
    舒剑
    Chinese Physics B, 2015, 24 (06) : 235 - 242