期刊
WIRELESS PERSONAL COMMUNICATIONS
卷 95, 期 3, 页码 3391-3406出版社
SPRINGER
DOI: 10.1007/s11277-017-4003-z
关键词
Authentication; Chaotic maps; User anonymity; Biometric; Password; Smart cards
资金
- Natural Science Foundation of Zhejiang Province [LZ12F02005]
- National Basic Research Program of China [2013CB834205]
- Key Laboratory of Public Security Information Application Based on Big-data Architecture, Ministry of Public Security [2014DSJSY004]
In order to provide secure remote access control, a robust and efficient authentication protocol should achieve mutual authentication and session key agreement between clients and the server over public channels. Recently, Wang et al. proposed a password based authentication protocol using chaotic maps. In this paper, we demonstrate the security of their scheme, and show that Wang et al.'s scheme cannot provide session key agreement and is insecure against denial of service attack for no detecting wrong password in password change. To remedy these issues, we use the techniques of fuzzy extractor and chaotic maps to propose a three-factor remote authentication scheme. The new scheme preserves user privacy and is secure against various attacks. Detailed analysis of previous schemes in efficiency and security shows our proposed scheme is more suitable for practical application.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据