4.4 Article

A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme

Journal

WIRELESS PERSONAL COMMUNICATIONS
Volume 95, Issue 3, Pages 3391-3406

Publisher

SPRINGER
DOI: 10.1007/s11277-017-4003-z

Keywords

Authentication; Chaotic maps; User anonymity; Biometric; Password; Smart cards

Funding

  1. Natural Science Foundation of Zhejiang Province [LZ12F02005]
  2. National Basic Research Program of China [2013CB834205]
  3. Key Laboratory of Public Security Information Application Based on Big-data Architecture, Ministry of Public Security [2014DSJSY004]

Ask authors/readers for more resources

In order to provide secure remote access control, a robust and efficient authentication protocol should achieve mutual authentication and session key agreement between clients and the server over public channels. Recently, Wang et al. proposed a password based authentication protocol using chaotic maps. In this paper, we demonstrate the security of their scheme, and show that Wang et al.'s scheme cannot provide session key agreement and is insecure against denial of service attack for no detecting wrong password in password change. To remedy these issues, we use the techniques of fuzzy extractor and chaotic maps to propose a three-factor remote authentication scheme. The new scheme preserves user privacy and is secure against various attacks. Detailed analysis of previous schemes in efficiency and security shows our proposed scheme is more suitable for practical application.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available