| Literature DB >> 28759615 |
Tian-Fu Lee1,2, Chia-Hung Hsiao1, Shi-Han Hwang1, Tsung-Hung Lin3.
Abstract
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.Entities:
Mesh:
Year: 2017 PMID: 28759615 PMCID: PMC5536435 DOI: 10.1371/journal.pone.0181744
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1The authenticated key exchange phase of the enhanced scheme.
Fig 2The password change phase of the enhanced scheme.
The notation used for logical analyses.
| Symbol | Description | |
|---|---|---|
| The message | ||
| The set of readers of channel | ||
| The set of writers of channel | ||
| ( | ||
The assumptions of the proposed scheme.
| (A1) |
| (A2) |
| (A3) |
| (A4) |
| (A5) |
The inference rules of the logic of the proposed scheme.
| Seeing rules |
| (S1) |
| (S2) |
| Interpretation rules |
| (I1) |
| (I2) |
| (I3) |
| Freshness rules |
| (F1) |
| (F2) |
| Rationality rules |
| (R1) |
Performance and security properties comparison.
| Schemes | Computations | Transmissions | P1 | P2 | P3 | |
|---|---|---|---|---|---|---|
| Islam et al.’s scheme [ | 5 | 2 | Yes | Yes | Yes | |
| Chen et al.’s scheme [ | 5 | 2 | No | No | Yes | |
| Jiang et al.’s scheme [ | 5 | 2 | No | Yes | Yes | |
| Wang et al.’s scheme [ | 10 | 2 | No | No | No | |
| Lee et al.’s scheme [ | 16 | 3 | No | No | No | |
| Yan et al.’s scheme [ | 11 | 3 | No | Yes | No | |
| Das-Goswami’s scheme [ | 2 | 2 | Yes | Yes | Yes | |
| Lee et al.’s scheme [ | 12 | 2 | No | No | Yes | |
| He et al.’s scheme [ | 10 | 2 | Yes | No | Yes | |
| Islam et al.’s scheme [ | 18 | 2 | Yes | No | Yes | |
| Jiang et al.’s scheme [ | 21 | 2 | Yes | Yes | Yes | |
| Lin’s scheme [ | 5 | 2 | Yes | No | Yes | |
| Enhanced scheme | 5 | 2 | Yes | Yes | Yes | |
P1: Resisting possible attacks; P2: User anonymity; P3: Perfect forward secrecy.