A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem

Nowadays chaos theory is widely used in cryptography. In the real world, in order to ensure secure communication, many chaotic maps-based key agreement protocols have been proposed. Most of them used a smart card on account of the inherent ability of anti-interference. Popularly, many related protocols using smart card are used for a single server environment. However, existing single server authentication protocols more or less have some defects. For a single server environment, if a remote user feels like using a number of network services, it is so complicated and boring to repeatedly register a new identity and password. To address this problem, numerous multi-server authentication schemes have been proposed. However, these existing proposed schemes pay attention to efficiency to ignore confidentiality, or focus on the message integrity to ignore efficiency. In our proposed paper, we propose a robust biometrics-based multiserver password-authenticated key agreement scheme on chaotic maps cryptosystem. In terms of the analysis of the security and functionality, the proposed scheme has a mass of merits, for instance, prefect forward secrecy, session key secrecy, robust biometrics authentication, password update secrecy, mutual authentication and key agreement. In addition, the proposed scheme can resist common attacks such as guessing attack, replay attack, man-in-the-middle attack and so on. In terms of the efficiency analysis, the proposed scheme is more practical.

[1]  Yuh-Min Tseng,et al.  An efficient user authentication and key exchange protocol for mobile client-server environment , 2010, Comput. Networks.

[2]  Chun-Ta Li,et al.  An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..

[3]  Ching-Chun Chang,et al.  A Secure and Efficient Authentication Scheme for E-coupon Systems , 2014, Wireless Personal Communications.

[4]  Yuh-Min Tseng,et al.  An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices , 2010, Comput. J..

[5]  Wen-Shenq Juang,et al.  Efficient multi-server password authenticated key agreement using smart cards , 2004, IEEE Transactions on Consumer Electronics.

[6]  Sudhish N. George,et al.  A novel approach for secure compressive sensing of images using multiple chaotic maps , 2014 .

[7]  Tzonelih Hwang,et al.  Non-interactive password authentications without password tables , 1990, IEEE TENCON'90: 1990 IEEE Region 10 Conference on Computer and Communication Systems. Conference Proceedings.

[8]  Cheng-Chi Lee,et al.  A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013, Nonlinear Dynamics.

[9]  Jue-Sam Chou,et al.  Security weaknesses in two multi-server password based authentication protocols , 2009, IACR Cryptol. ePrint Arch..

[10]  Xiaomin Wang,et al.  Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices , 2008 .

[11]  Cheng-Chi Lee A simple key agreement scheme based on chaotic maps for VSAT satellite communications , 2013, Int. J. Satell. Commun. Netw..

[12]  Sang-Gon Lee Cryptanalysis of Multiple-Server Password-Authenticated Key , 2009, IACR Cryptol. ePrint Arch..

[13]  Chin-Chen Chang,et al.  Chaotic maps-based password-authenticated key agreement using smart cards , 2013, Commun. Nonlinear Sci. Numer. Simul..

[14]  Jayaprakash Kar,et al.  An Efficient Password Security of Multi-Party Key Exchange Protocol based on ECDLP , 2009 .

[15]  Chin-Chen Chang,et al.  An efficient and secure multi-server password authentication scheme using smart cards , 2004, 2004 International Conference on Cyberworlds.

[16]  Yuh-Min Tseng,et al.  Towards generalized ID-based user authentication for mobile multi-server environment , 2012, Int. J. Commun. Syst..

[17]  Muhammad Khurram Khan,et al.  Improving the security of 'a flexible biometrics remote user authentication scheme' , 2007, Comput. Stand. Interfaces.

[18]  Yu-Chung Chiu,et al.  Improved remote authentication scheme with smart card , 2005, Comput. Stand. Interfaces.

[19]  Hideki Imai,et al.  Theoretical framework for constructing matching algorithms in biometric authentication systems , 2009, ICB.

[20]  Yalin Chen,et al.  Comments on two multi-server authentication protocols , 2008, IACR Cryptol. ePrint Arch..

[21]  Chin-Chen Chang,et al.  Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications , 2013, J. Inf. Hiding Multim. Signal Process..

[22]  Jia-Lun Tsai,et al.  Efficient multi-server authentication scheme based on one-way hash function without verification table , 2008, Comput. Secur..

[23]  Bin Wang,et al.  A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme , 2012, Wireless Personal Communications.

[24]  Ping Li,et al.  A secure chaotic maps-based key agreement protocol without using smart cards , 2012 .

[25]  Eun-Jun Yoon,et al.  Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem , 2010, The Journal of Supercomputing.

[26]  Qi Xie,et al.  Chaotic maps-based three-party password-authenticated key agreement scheme , 2013, Nonlinear Dynamics.

[27]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[28]  Tariq Shah,et al.  Application of S-box and chaotic map for image encryption , 2013, Math. Comput. Model..

[29]  Jian Ma,et al.  A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments , 2013, Math. Comput. Model..

[30]  Iqtadar Hussain,et al.  A technique for digital steganography using chaotic maps , 2014 .

[31]  Zhijian Wang,et al.  An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm , 2014, TheScientificWorldJournal.

[32]  Wen-Chung Kuo,et al.  A new digital signature scheme based on chaotic maps , 2013, Nonlinear dynamics.

[33]  Cheng-Chi Lee,et al.  An extended chaotic maps-based key agreement protocol with user anonymity , 2011, Nonlinear Dynamics.

[34]  Shahram Etemadi Borujeni,et al.  Image Encryption Using Random Bit Sequence Based on Chaotic Maps , 2013, Arabian Journal for Science and Engineering.