An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture

Multi-server authentication enables the subscribers to enjoy an assortment of services from various service providers based on a single registration from any registration centre. Previously, a subscriber had to register from each service provider individually to avail respective services relying on single server authentication. In the past, a number of multi-server authentication techniques can be witnessed that employed lightweight and even computationally intensive cryptographic operations. In line with this, Zhu has presented a chaotic map based multi-server authentication scheme recently, which is not only vulnerable to denial-of-service attack, stolen-verifier attack, but also lacks anonymity. This research aims at improving the Zhu’s protocol in terms of cost and efficiency. Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.

[1]  Jianfeng Ma,et al.  Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy , 2016 .

[2]  Muhammad Sher,et al.  An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre , 2016, The Journal of Supercomputing.

[3]  SK Hafizul Islam,et al.  Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps , 2015, Inf. Sci..

[4]  Hongfeng Zhu,et al.  Flexible and Password-Authenticated Key Agreement Scheme Based on Chaotic Maps for Multiple Servers to Server Architecture , 2015, Wirel. Pers. Commun..

[5]  Jin Wang,et al.  Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .

[6]  Xiong Li,et al.  Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol , 2015 .

[7]  Wei Liang,et al.  Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update , 2015, Int. J. Commun. Syst..

[8]  Wei Liang,et al.  An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture , 2015, Wirel. Pers. Commun..

[9]  Jin Wang,et al.  A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks , 2014 .

[10]  Xiong Li,et al.  Applying biometrics to design three-factor remote user authentication scheme with key agreement , 2014, Secur. Commun. Networks.

[11]  Jenq-Shiou Leu,et al.  Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks , 2014, Wirel. Commun. Mob. Comput..

[12]  Mohammad Sabzinejad Farash,et al.  An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps , 2014, Nonlinear Dynamics.

[13]  Shashikala Tapaswi,et al.  Robust Smart Card Authentication Scheme for Multi-server Architecture , 2013, Wireless Personal Communications.

[14]  Qi Xie,et al.  Chaotic maps-based three-party password-authenticated key agreement scheme , 2013, Nonlinear Dynamics.

[15]  Sirma Yavuz,et al.  Designing chaotic S-boxes based on time-delay chaotic system , 2013 .

[16]  Peng Gong,et al.  Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials , 2013, Nonlinear Dynamics.

[17]  Kefei Chen,et al.  Cryptanalysis and enhancements of efficient three‐party password‐based key exchange scheme , 2013, Int. J. Commun. Syst..

[18]  Cheng-Chi Lee,et al.  A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013, Nonlinear Dynamics.

[19]  Zuowen Tan,et al.  A chaotic maps-based authenticated key agreement protocol with strong anonymity , 2013, Nonlinear Dynamics.

[20]  Tariq Shah,et al.  An efficient approach for the construction of LFT S-boxes using chaotic logistic map , 2012, Nonlinear Dynamics.

[21]  Cheng-Chi Lee,et al.  A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2012, Nonlinear Dynamics.

[22]  Muhammad Khurram Khan,et al.  Cryptanalysis of a key agreement protocol based on chaotic Hash , 2013, Int. J. Electron. Secur. Digit. Forensics.

[23]  Yixian Yang,et al.  Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol , 2012 .

[24]  Tariq Shah,et al.  A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm , 2012, Nonlinear Dynamics.

[25]  Eui-nam Huh,et al.  A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks , 2012, Secur. Commun. Networks.

[26]  Jun-Han Yang,et al.  Provably secure three-party password authenticated key exchange protocol in the standard model , 2012, J. Syst. Softw..

[27]  Ljupco Kocarev,et al.  Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.

[28]  Xingyuan Wang,et al.  An anonymous key agreement protocol based on chaotic maps , 2011 .

[29]  Xing-yuan Wang,et al.  An improved key agreement protocol based on chaos , 2010 .

[30]  Jiashu Zhang,et al.  Secure group key agreement protocol based on chaotic Hash , 2010, Inf. Sci..

[31]  Eun-Jun Yoon,et al.  Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem , 2010, The Journal of Supercomputing.

[32]  Mohsen Guizani,et al.  An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network , 2009, IEEE Transactions on Vehicular Technology.

[33]  Tao Xiang,et al.  On the security of a novel key agreement protocol based on chaotic maps , 2009 .

[34]  José M. Amigó,et al.  Chaos-Based Cryptography , 2009, Intelligent Computing Based on Chaos.

[35]  Song Han,et al.  Security of a key agreement protocol based on chaotic maps , 2008 .

[36]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[37]  Chun-Ta Li,et al.  A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..

[38]  Jia-Lun Tsai,et al.  Efficient multi-server authentication scheme based on one-way hash function without verification table , 2008, Comput. Secur..

[39]  Xiaofeng Liao,et al.  Using time-stamp to improve the security of a chaotic maps-based key agreement protocol , 2008, Inf. Sci..

[40]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[41]  Xiaofeng Liao,et al.  A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..

[42]  Muhammad Khurram Khan,et al.  Improving the security of 'a flexible biometrics remote user authentication scheme' , 2007, Comput. Stand. Interfaces.

[43]  Kwok-Wo Wong,et al.  An efficient entire chaos-based scheme for deniable authentication , 2005 .

[44]  Gonzalo Alvarez,et al.  Security problems with a chaos-based deniable authentication scheme , 2004, nlin/0412023.

[45]  Yu-Chung Chiu,et al.  Improved remote authentication scheme with smart card , 2005, Comput. Stand. Interfaces.

[46]  Chu-Hsing Lin,et al.  A flexible biometrics remote user authentication scheme , 2004, Comput. Stand. Interfaces.

[47]  Min-Shiang Hwang,et al.  A new remote user authentication scheme for multi-server architecture , 2003, Future Gener. Comput. Syst..

[48]  Min-Shiang Hwang,et al.  A remote password authentication scheme for multiserver architecture using neural networks , 2001, IEEE Trans. Neural Networks.

[49]  Hung-Min Sun,et al.  An efficient remote use authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..

[50]  M. Baptista Cryptography with chaos , 1998 .

[51]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[52]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[53]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[54]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.