Efficient and secure three-factor user authentication and key agreement using chaotic maps

Jiaxi Hu, Zhiqiang Xu, Debiao He, Sherali Zeadally, Kim Kwang Raymond Choo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

User authentication and key agreement are essential for implementing secure wireless communication, especially in mobile devices. Many authentication and key agreement schemes are based on both the smart card and the password. Unfortunately, most of these schemes are vulnerable, such as password guessing attack and smart card loss attack. Recently, Han et al. proposed a three-factor key agreement and authentication scheme by using fuzzy extractor and chaotic maps. However, it is proved that Han et al.’s scheme can not protect user anonymity and involves some redundant operations. To address the security defects, we proposed an improved user authentication and key agreement scheme. Although our scheme incurs slightly delay than others, it can resist various attacks. Moreover, our scheme is efficient for practical application deployments compared with other previously proposed user authentication schemes.

Original languageEnglish
Title of host publicationCyberspace Safety and Security - 11th International Symposium, CSS 2019, Proceedings
EditorsJaideep Vaidya, Xiao Zhang, Jin Li
Pages186-202
Number of pages17
DOIs
StatePublished - 2019
Event11th International Symposium on Cyberspace Safety and Security, CSS 2019 - Guangzhou, China
Duration: Dec 1 2019Dec 3 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11982 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Symposium on Cyberspace Safety and Security, CSS 2019
Country/TerritoryChina
CityGuangzhou
Period12/1/1912/3/19

Bibliographical note

Funding Information:
Acknowledgements. The work was supported in part by the National Key Research and Development Program of China (No. 2018YFC1315404) and the National Natural Science Foundation of China (Nos. 61572370, 61572379).

Publisher Copyright:
© 2019, Springer Nature Switzerland AG.

Keywords

  • Authentication
  • Chaotic maps
  • Security
  • Smart card

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science (all)

Fingerprint

Dive into the research topics of 'Efficient and secure three-factor user authentication and key agreement using chaotic maps'. Together they form a unique fingerprint.

Cite this