信息网络安全 ›› 2022, Vol. 22 ›› Issue (12): 25-33.doi: 10.3969/j.issn.1671-1122.2022.12.004

• 技术研究 • 上一篇    下一篇

一种基于切比雪夫混沌映射的可证明安全的溯源认证协议

张昱1,2, 孙光民1(), 翟鹏1,2, 李煜1   

  1. 1.北京工业大学信息学部,北京 100124
    2.济宁学院数学与计算机应用技术学院,曲阜 272000
  • 收稿日期:2022-08-10 出版日期:2022-12-10 发布日期:2022-12-30
  • 通讯作者: 孙光民 E-mail:gmsun@bjut.edu.cn
  • 作者简介:张昱(1978—),男,山东,博士研究生,主要研究方向为网络安全|孙光民(1960—),男,山西,教授,博士,主要研究方向为神经网络、网络安全|翟鹏(1978—),男,山东,博士研究生,主要研究方向为网络安全、区块链技术|李煜(1986—),男,北京,副教授,博士,主要研究方向为模式识别、深度学习及应用
  • 基金资助:
    国家自然科学基金(41706201)

A Provably Secure Traceability Authentication Protocol Based on Chebyshev Chaotic Map

ZHANG Yu1,2, SUN Guangmin1(), ZHAI Peng1,2, LI Yu1   

  1. 1. Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
    2. School of Mathematics and Computer Application Technology, Jining University, Qufu 272000, China
  • Received:2022-08-10 Online:2022-12-10 Published:2022-12-30
  • Contact: SUN Guangmin E-mail:gmsun@bjut.edu.cn

摘要:

为降低计算开销,提高安全性,文章利用哈希函数的不可逆性和切比雪夫混沌映射的半群特性设计了一种溯源验证算法,并基于该算法设计了注册中心(Registry Centre,RC)离线模式的身份认证协议。文章提出的方案将传统的口令与生物特征、公钥密码相结合,实现了三因素认证和双向溯源认证,并且不需要注册中心参与认证过程。文章在认证方案中设计了双密钥双重加密机制,通过计算得到一次性密钥,传输的信息使用一次性密钥进行加密,能够有效降低计算开销,实现密文传输、隐私保护和前向安全。通过安全性分析、BAN逻辑证明、ProVerif工具仿真验证表明,文章提出的协议是安全的;与其他同类方案相比,文章所提方案更安全、更高效,适用于资源有限的移动互联网络环境。

关键词: 切比雪夫混沌映射, 溯源验证, BAN逻辑, ProVerif, 身份认证

Abstract:

In order to reduce computational cost and improve security, a novel traceability verification algorithm was designed by means of the irreversibility of the Hash function and the semigroup characteristic of the Chebyshev chaotic map. Based on the traceability verification algorithm, an authentication protocol of registry centrel offline mode was proposed. The proposed scheme combined the traditional password, biological features and public key cryptography to realize the three-factor authentication and mutual traceability authentication. The dual-key dual-encryption mechanism was designed in the authentication scheme. The calculated one-time key was used to encrypt the transmitted information, which can effectively reduce the computation cost and realize the ciphertext transmission, privacy protection and forward security. Through security analysis, BAN logic proof, and ProVerif simulation tool verification, the results show that the protocol is secure. Compared with other similar schemes, the proposed scheme is safer and more efficient. To conclude, the proposed scheme is easy to be realized in the resource-limited mobile Internet environment.

Key words: Chebyshev chaos map, traceability verification, BAN logic, ProVerif, authentication

中图分类号: