| Literature DB >> 27101305 |
Yanrong Lu1,2, Lixiang Li1,2, Hao Zhang1,2, Yixian Yang1,2.
Abstract
User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.'s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.'s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance.Entities:
Mesh:
Year: 2016 PMID: 27101305 PMCID: PMC4839728 DOI: 10.1371/journal.pone.0153870
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Mutual authentication and key agreement of Xie et al.’s scheme.
Fig 2Mutual authentication and key agreement of our scheme.
Algorithm 1.
| 1. Intercept the login message { |
| 2. Call Reveal oracle 1. Let |
| 3. Intercept the authenticated message { |
| 4. Call Reveal oracle 1. Let |
| 5. |
| 6. Accept |
| 7. |
| 8. |
| 9. |
| 10. |
Algorithm 2.
| 1. Intercept the login message { |
| 2. Call Reveal oracle 2. Let |
| 3. Intercept the authenticated message Intercept the login message { |
| where |
| 4. Call Reveal oracle 1. Let |
| 5. |
| 6. Accept |
| 7. |
| 8. |
| 9. |
| 10. |
Fig 3Simulation result for the OFMC.
Fig 4Simulation result for the CL-AtSe.
Performance comparison.
| Ours | Xie et al. [ | Chou et al. [ | He-Wang [ | Nam et al. [ | |
|---|---|---|---|---|---|
| User | 3 | 3 | 3 | 3 | 3 |
| Second party | 2 | 3 | 3 | 2 | 1 |
| Third patry | 5 | 4 | 3 | 2 | 1 |
| Communication rounds | 6 | 5 | 6 | 6 | 4 |
Security properties comparison.
| Ours | Xie et al. [ | Chou et al. [ | He-Wang [ | Nam et al. [ | |
|---|---|---|---|---|---|
| Session key perfect forward secrecy | Yes | No | Yes | Yes | Yes |
| Mutual authentication | Yes | Yes | Yes | Yes | Yes |
| User anonymity | Yes | No | No | Yes | Yes |
| Insider attack | Yes | Yes | - | Yes | No |
| Off-line password guessing attack | Yes | No | - | Yes | No |
| Impersonation attack | Yes | No | No | No | No |