An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity

被引:6
|
作者
Zhou, Yousheng [1 ,2 ]
Zhou, Junfeng [1 ]
Wang, Feng [3 ]
Guo, Feng [4 ]
机构
[1] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[3] Dezhou Univ, Coll Math Sci, Dezhou 253023, Peoples R China
[4] Dublin City Univ, Sch Elect Engn, Dublin 9, Ireland
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2016/3916942
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in which the real identity of the user is encrypted with a shared key between the user and the trusted server. Only the trusted server can determine the real identity of a user during the authentication, and any other entities including other users of the system get nothing about the user's real identity. In addition, the shared key of encryption can be easily computed by the user and trusted server using the Chebyshev map without additional burdensome key management. Once the partnered two users are authenticated by the trusted server, they can easily proceed with the agreement of the session key. Formal security analysis demonstrates that the proposed scheme is secure under the random oracle model.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing
    Wu, Fan
    Xu, Lili
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 189 - 200
  • [2] Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme
    Ryu, Jihyeon
    Kang, Dongwoo
    Won, Dongho
    [J]. IEEE ACCESS, 2022, 10 : 15891 - 15910
  • [3] Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol
    Chen, Chien-Ming
    Fang, Weicheng
    Liu, Shuai
    Wu, Tsu-Yang
    Pan, Jeng-Shyang
    Wang, King-Hang
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (02) : 371 - 390
  • [4] Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems
    Jiang, Qi
    Ma, Jianfeng
    Lu, Xiang
    Tian, Youliang
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (02)
  • [5] Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems
    Qi Jiang
    Jianfeng Ma
    Xiang Lu
    Youliang Tian
    [J]. Journal of Medical Systems, 2014, 38
  • [6] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Hao, Xinhong
    Wang, Jiantao
    Yang, Qinghai
    Yan, Xiaopeng
    Li, Ping
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
  • [7] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Xinhong Hao
    Jiantao Wang
    Qinghai Yang
    Xiaopeng Yan
    Ping Li
    [J]. Journal of Medical Systems, 2013, 37
  • [8] Chebyshev chaotic map-based efficient authentication scheme for secure access of VoIP services through SIP
    Mahor, Vinod Kumar
    Padmavathy, R.
    Chatterjee, Santanu
    [J]. International Journal of Security and Networks, 2022, 17 (01) : 39 - 47
  • [9] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Wei-Chuen Yau
    Raphael C.-W. Phan
    [J]. Journal of Medical Systems, 2013, 37
  • [10] A secure chaotic map-based remote authentication scheme for telecare medicine information systems
    Li, Xiong
    Wu, Fan
    Khan, Muhammad Khurram
    Xu, Lili
    Shen, Jian
    Jo, Minho
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 149 - 159