Netinfo Security ›› 2022, Vol. 22 ›› Issue (12): 25-33.doi: 10.3969/j.issn.1671-1122.2022.12.004
Previous Articles Next Articles
ZHANG Yu1,2, SUN Guangmin1(), ZHAI Peng1,2, LI Yu1
Received:
2022-08-10
Online:
2022-12-10
Published:
2022-12-30
Contact:
SUN Guangmin
E-mail:gmsun@bjut.edu.cn
CLC Number:
ZHANG Yu, SUN Guangmin, ZHAI Peng, LI Yu. A Provably Secure Traceability Authentication Protocol Based on Chebyshev Chaotic Map[J]. Netinfo Security, 2022, 22(12): 25-33.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2022.12.004
符号 | 意义 | 符号 | 意义 |
---|---|---|---|
RC | 注册中心 | 服务器的公钥和 私钥 | |
注册中心的公钥和私钥 | Hash函数 | ||
一个大素数 | 密钥为 | ||
用户 | 密钥为 | ||
用户 | 随机数 | ||
用户的公钥和私钥 | 有效时间间隔 | ||
用户 | || | 比特串拼接 | |
服务器 标识 | 当前时间 | ||
服务器 口令 | 共享的临时会话 密钥 |
符号 | 意义 |
---|---|
主体 | |
主体 | |
主体 | |
主体 | |
用密钥 | |
消息 |
序号 | 规则 |
---|---|
R1 | |
R2 | |
R3 | |
R4 | |
R5 | |
R6 | |
R7 | |
R8 | |
R9 | |
R10 | |
R11 | |
R12 | |
R13 | |
R14 | |
R15 | |
R16 | |
R17 | |
R18 | |
R19 |
方案 | 注册阶段 | 登录、认证、密钥协商阶段 | 口令更改阶段 |
---|---|---|---|
文献[ | 3TH+TGen=404 | 12TH+6TC+8TE+ TGen=422.5 | 2TH+TGen=403.5 |
文献[ | 9TH+TGen=407 | 21TH+TRep+ 4TC=108 | 8TH+TRep+TGen=500 |
文献[ | 11TH+9TP+ 4TA=600.5 | 17TH+7TP+ 7TA=638.5 | 6TH+4TP+2TA=269 |
文献[ | TH+TECC=484.5 | 4TH+7TECC=3390 | 2TH+TECC+4TE=489 |
本文方案 | 4TH+2TC+TF=19 | 8TH+6TC+4TE+ 4TD+TB+TF=33 | 5TH+2TC+TB+TF=19.5 |
[1] | ZHU Hongfeng, HAO Xin, ZHANG Yifeng, et al. A Biometrics-Based Multi-Server Key Agreement Scheme on Chaotic Maps Cryptosystem[J]. Journal of Information Hiding and Multimedia Signal Processing, 2015, 6(2): 211-224. |
[2] |
JIANG Qi, WEI Fushan, FU Shuai, et al. Robust Extended Chaotic Maps-Based Three-Factor Authentication Scheme Preserving Biometric Template Privacy[J]. Nonlinear Dynamics, 2016, 83(4): 2085-2101.
doi: 10.1007/s11071-015-2467-5 URL |
[3] |
ALI R, PAL A. A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem[J]. International Journal of Business Data Communications and Networking, 2017, 13(1): 74-84.
doi: 10.4018/IJBDCN.2017010107 URL |
[4] | ZHANG Min. Research and Design of Remote Identity Authentication Schemes Based on Three-Factor in Multi-Environments[D]. Chengdu: Southwest Jiaotong University, 2017. |
张敏. 多环境下基于三因素的远程身份认证协议研究与设计[D]. 成都: 西南交通大学, 2017. | |
[5] | DONG Xiaolu, LI Meihong, DU Ye, et al. A Biometric Verification Based Authentication Scheme Using Chebyshev Chaotic Mapping[J]. Journal of Beijing University of Aeronautics and Astronautics, 2019, 45(5): 1052-1058. |
董晓露, 黎妹红, 杜晔, 等. 基于切比雪夫混沌映射和生物识别的身份认证方案[J]. 北京航空航天大学学报, 2019, 45(5): 1052-1058. | |
[6] |
ZHOU Simin, GAN Qingqing, WANG Xiaoming. Authentication Scheme Based on Smart Card in Multi-Server Environment[J]. Wireless Networks, 2020, 26(2): 855-863.
doi: 10.1007/s11276-018-1828-7 URL |
[7] |
LWAMO N, ZHU Lihuang, XU Chang, et al. Suaa: A Secure User Authentication Scheme with Anonymity for the Single & Multi-Server Environments[J]. Information Sciences, 2018, 477: 369-385.
doi: 10.1016/j.ins.2018.10.037 URL |
[8] |
ROY S, DAS A, CHATTERJEE S, et al. Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications[J]. IEEE Transactions on Industrial Informatics, 2019, 15(1): 457-468.
doi: 10.1109/TII.2018.2824815 URL |
[9] |
CHATTERJEE S, ROY S, DAS A, et al. Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 15(5): 824-839.
doi: 10.1109/TDSC.2016.2616876 URL |
[10] | LUO Yuling, LIU Yunqi, LIU Junxiu, et al. ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks[J]. International Journal of Bifurcation and Chaos, 2019, 29(9): 1-16. |
[11] |
RANGWANI D, SADHUKHAN D, RAY S, et al. A Robust Provable-Secure Privacy-Preserving Authentication Protocol for Industrial Internet of Things[J]. Peer-to-peer Networking and Applications, 2021, 14(12): 1548-1571.
doi: 10.1007/s12083-020-01063-5 URL |
[12] | XU Zhiqiang, HE Debiao, HUANG Xinyi. Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-Server Environments[C]// Springer. International Conference on Information and Communications Security. Berlin:Springer, 2017: 595-605. |
[13] |
BARMAN S, SHUM, H, CHATTOPADHYAY S, et al. A Secure Authentication Protocol for Multi-Server-Based E-Healthcare Using a Fuzzy Commitment Scheme[J]. IEEE Access, 2019, 7: 12557-12574.
doi: 10.1109/ACCESS.2019.2893185 URL |
[14] | ZHANG Xiao, LIU Jiqiang. Multi-Factor Authentication Protocol Based on Hardware Fingerprint and Biometrics[J]. Netinfo Security, 2020, 20(8): 9-15. |
张骁, 刘吉强. 基于硬件指纹和生物特征的多因素身份认证协议[J]. 信息网络安全, 2020, 20(8): 9-15. | |
[15] | NAMASUDR S, ROY P. A New Secure Authentication Scheme for Cloud Computing Environment[J]. Concurrency and Computation: Practice and Experience, 2017, 29(20): 1-20. |
[16] | KOCAREV L, TASEV Z. Public-Key Encryption Based on Chebyshev Maps[C]// IEEE. International Symposium on Circuits and Systems. New York: IEEE, 2003: 25-28. |
[17] |
ZHANG Linhua. Cryptanalysis of the Public Key Encryption Based on Multiple Chaotic Systems[J]. Chaos, Solitons and Fractals, 2008, 37(3): 669-674.
doi: 10.1016/j.chaos.2006.09.047 URL |
[18] | LIU Tianhua, WANG Qian, ZHU Hongfeng. A Multi-Function Password Mutual Authentication Key Agreement Scheme with Privacy Preserving[J]. Journal of Information Hiding and Multimedia Signal Processing, 2014, 5(2): 165-178. |
[19] | BURROWS M, ABADI M, NEEDHAM R. A Logic of Authentication[J]. Proceedings of the Royal Society, 1989, 426: 233-271. |
[20] |
SHUAI Mengxia, XIONG Ling, WANG Changhui, et al. A Secure Authentication Scheme with Forward Secrecy for Industrial Internet of Things Using Rabin Cryptosystem[J]. Computer Communications, 2020, 160(7): 215-227.
doi: 10.1016/j.comcom.2020.06.012 URL |
[21] |
LEE C. A Simple Key Agreement Scheme Based on Chaotic Maps for VSAT Satellite Communications[J]. International Journal of Satellite Communications and Networking, 2013, 31(4): 177-186.
doi: 10.1002/sat.1033 URL |
[22] |
ODELU V, DAS A, GOSWAMI A. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1953-1966.
doi: 10.1109/TIFS.2015.2439964 URL |
[23] |
ZHANG Min, ZHANG Jiashu, ZHANG Ying. Remote Three-Factor Authentication Scheme Based on Fuzzy Extractors[J]. Security and Communication Networks, 2015, 8(4): 682-693.
doi: 10.1002/sec.1016 URL |
[24] | CHEN Sheng, LIU Yang, GAO Xiang, et al. MobileFaceNets: Efficient CNNs for Accurate Real-Time Face Verification on Mobile Devices[C]// Springer. Chinese Conference on Biometric Recognition. Berlin:Springer, 2018: 428-438. |
[25] |
MO Jiaqing, HU Zhongwang, SHEN Wei. A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network[J]. IEEE Access, 2022, 10: 12137-12152.
doi: 10.1109/ACCESS.2022.3146393 URL |
[1] | ZHANG Min, XU Chunxiang, ZHANG Jianhua. Research on Authentication Key Agreement Protocol Based on Multi-Factor in Internet of Drones [J]. Netinfo Security, 2022, 22(9): 21-30. |
[2] | ZHANG Xuewang, LIU Yufan. Identity Traceable Anonymous Authentication Scheme for Nodes in the Perception Layer of IoT [J]. Netinfo Security, 2022, 22(9): 55-62. |
[3] | LIU Xin, LI Yunyi, WANG Miao. A Lightweight Authentication Protocol Based on Confidential Computing for Federated Learning Nodes [J]. Netinfo Security, 2022, 22(7): 37-45. |
[4] | WANG Shushuang, MA Zhaofeng, LIU Jiawei, LUO Shoushan. Research and Implementation of Cross-Chain Security Access and Identity Authentication Scheme of Blockchain [J]. Netinfo Security, 2022, 22(6): 61-72. |
[5] | SHI Runhua, WANG Shuhao, LI Kunchang. A Lightweight Cross-domain Mutual Authentication Scheme in V2G Networks [J]. Netinfo Security, 2022, 23(3): 20-28. |
[6] | WU Kehe, CHENG Rui, JIANG Xiaochen, ZHANG Jiyu. Security Protection Scheme of Power IoT Based on SDP [J]. Netinfo Security, 2022, 22(2): 32-38. |
[7] | LIU Xin, WANG Jiayin, YANG Haorui, ZHANG Ruisheng. An Internet of Vehicles Authentication Protocol Based on Blockchain and secGear Framework [J]. Netinfo Security, 2022, 22(1): 27-36. |
[8] | LI Tong, REN Shuai, WANG Gang, MENG Qingyu. Cloud-edge-device Collaborative Integrity Verification Scheme Based on Chameleon Authentication Tree for Streaming Data [J]. Netinfo Security, 2022, 22(1): 37-45. |
[9] | WANG Yuedong, XIONG Yan, HUANG Wenchao, WU Jianshuang. A Formal Analysis Scheme for 5G Private Network Authentication Protocol [J]. Netinfo Security, 2021, 21(9): 1-7. |
[10] | WU Kehe, CHENG Rui, ZHENG Bihuang, CUI Wenchao. Research on Security Communication Protocol of Power Internet of Things [J]. Netinfo Security, 2021, 21(9): 8-15. |
[11] | LIU Xin, YANG Haorui, GUO Zhenbin, WANG Jiayin. An Authentication Protocol Achieving Online Registration and Privilege Separation for Industrial Internet of Things [J]. Netinfo Security, 2021, 21(7): 1-9. |
[12] | LIU Xin, GUO Zhenbin, SONG Yuchen. An Authentication Scheme Based on SGX for Industrial Internet of Things [J]. Netinfo Security, 2021, 21(6): 1-10. |
[13] | SHEN Zhuowei, GAO Peng, XU Xinyu. Design of DDS Secure Communication Middleware Based on Security Negotiation [J]. Netinfo Security, 2021, 21(6): 19-25. |
[14] | WANG Chao, HAN Yiliang, DUAN Xiaowei, LI Yu. RLWE-type Authentication Key Exchange Protocol Based on Key Encapsulation Mechanism [J]. Netinfo Security, 2021, 21(6): 80-88. |
[15] | LI Peng, ZHENG Tiantian, XU He, ZHU Feng. RFID Security Authentication Protocol Based on Blockchain Technology [J]. Netinfo Security, 2021, 21(5): 1-11. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||