An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity

被引:6
|
作者
Zhou, Yousheng [1 ,2 ]
Zhou, Junfeng [1 ]
Wang, Feng [3 ]
Guo, Feng [4 ]
机构
[1] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[3] Dezhou Univ, Coll Math Sci, Dezhou 253023, Peoples R China
[4] Dublin City Univ, Sch Elect Engn, Dublin 9, Ireland
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2016/3916942
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in which the real identity of the user is encrypted with a shared key between the user and the trusted server. Only the trusted server can determine the real identity of a user during the authentication, and any other entities including other users of the system get nothing about the user's real identity. In addition, the shared key of encryption can be easily computed by the user and trusted server using the Chebyshev map without additional burdensome key management. Once the partnered two users are authenticated by the trusted server, they can easily proceed with the agreement of the session key. Formal security analysis demonstrates that the proposed scheme is secure under the random oracle model.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] CMAP-IoT: Chaotic Map-Based Authentication Protocol for Crowdsourcing Internet of Things
    Tanveer, Muhammad
    Bhutta, Muhammad Nasir Mumtaz
    Alzahrani, Bander A.
    Albeshri, Aiiad
    Alsubhi, Khalid
    Chaudhry, Shehzad Ashraf
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 3453 - 3466
  • [42] Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
    Wang, Guojun
    Liu, Qi
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 4471 - 4488
  • [43] A Lightweight Chaotic Map-Based Key Agreement Scheme for the Advanced Metering Infrastructure
    Wang, Baoyi
    Feng, Yaowei
    Zhang, Shaomin
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (06):
  • [44] Chaotic Map based Privacy Preservation User Authentication Scheme for WBANs
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    [J]. PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 1037 - 1042
  • [45] A novel Cosine-Cosine chaotic map-based video encryption scheme
    Kumari S.
    Dua M.
    Dua S.
    Dhingra D.
    [J]. Journal of Engineering and Applied Science, 2024, 71 (01):
  • [46] An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs
    Zhou, Yanwei
    Cao, Lei
    Qiao, Zirui
    Xia, Zhe
    Yang, Bo
    Zhang, Mingwu
    Zhang, Wenzheng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (11) : 10052 - 10065
  • [47] An Efficient Remote User Authentication Scheme with Strong Anonymity
    Liu, Yanfei
    Zhao, Ziming
    Li, Hui
    Luo, Qun
    Yang, Yixian
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS, 2008, : 180 - 185
  • [48] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [49] C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications
    Zhang, Zhihua
    Wang, Huanwen
    Gao, Yanghua
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2015, 19 (07) : 1053 - 1061
  • [50] C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications
    Zhihua Zhang
    Huanwen Wang
    Yanghua Gao
    [J]. Personal and Ubiquitous Computing, 2015, 19 : 1053 - 1061