User authentication and key agreement are essential for implementing secure wireless communication, especially in mobile devices. Many authentication and key agreement schemes are based on both the smart card and the password. Unfortunately, most of these schemes are vulnerable, such as password guessing attack and smart card loss attack. Recently, Han et al. proposed a three-factor key agreement and authentication scheme by using fuzzy extractor and chaotic maps. However, it is proved that Han et al.’s scheme can not protect user anonymity and involves some redundant operations. To address the security defects, we proposed an improved user authentication and key agreement scheme. Although our scheme incurs slightly delay than others, it can resist various attacks. Moreover, our scheme is efficient for practical application deployments compared with other previously proposed user authentication schemes.
|Title of host publication||Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Proceedings|
|Editors||Jaideep Vaidya, Xiao Zhang, Jin Li|
|Number of pages||17|
|State||Published - 2019|
|Event||11th International Symposium on Cyberspace Safety and Security, CSS 2019 - Guangzhou, China|
Duration: Dec 1 2019 → Dec 3 2019
|Name||Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)|
|Conference||11th International Symposium on Cyberspace Safety and Security, CSS 2019|
|Period||12/1/19 → 12/3/19|
Bibliographical noteFunding Information:
Acknowledgements. The work was supported in part by the National Key Research and Development Program of China (No. 2018YFC1315404) and the National Natural Science Foundation of China (Nos. 61572370, 61572379).
© 2019, Springer Nature Switzerland AG.
- Chaotic maps
- Smart card
ASJC Scopus subject areas
- Theoretical Computer Science
- Computer Science (all)