An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity

A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in which the real identity of the user is encrypted with a shared key between the user and the trusted server. Only the trusted server can determine the real identity of a user during the authentication...

Full description

Saved in:
Bibliographic Details
Main Authors: Yousheng Zhou, Junfeng Zhou, Feng Wang, Feng Guo
Format: Article
Language:English
Published: Wiley 2016-01-01
Series:Applied Computational Intelligence and Soft Computing
Online Access:http://dx.doi.org/10.1155/2016/3916942
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832558466014642176
author Yousheng Zhou
Junfeng Zhou
Feng Wang
Feng Guo
author_facet Yousheng Zhou
Junfeng Zhou
Feng Wang
Feng Guo
author_sort Yousheng Zhou
collection DOAJ
description A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in which the real identity of the user is encrypted with a shared key between the user and the trusted server. Only the trusted server can determine the real identity of a user during the authentication, and any other entities including other users of the system get nothing about the user’s real identity. In addition, the shared key of encryption can be easily computed by the user and trusted server using the Chebyshev map without additional burdensome key management. Once the partnered two users are authenticated by the trusted server, they can easily proceed with the agreement of the session key. Formal security analysis demonstrates that the proposed scheme is secure under the random oracle model.
format Article
id doaj-art-8e2481ebcefe4b2aa679936ba81ce2fb
institution Kabale University
issn 1687-9724
1687-9732
language English
publishDate 2016-01-01
publisher Wiley
record_format Article
series Applied Computational Intelligence and Soft Computing
spelling doaj-art-8e2481ebcefe4b2aa679936ba81ce2fb2025-02-03T01:32:18ZengWileyApplied Computational Intelligence and Soft Computing1687-97241687-97322016-01-01201610.1155/2016/39169423916942An Efficient Chaotic Map-Based Authentication Scheme with Mutual AnonymityYousheng Zhou0Junfeng Zhou1Feng Wang2Feng Guo3College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, ChinaCollege of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, ChinaCollege of Mathematical Sciences, Dezhou University, Dezhou 253023, ChinaSchool of Electronic Engineering, Dublin City University, Dublin 9, IrelandA chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in which the real identity of the user is encrypted with a shared key between the user and the trusted server. Only the trusted server can determine the real identity of a user during the authentication, and any other entities including other users of the system get nothing about the user’s real identity. In addition, the shared key of encryption can be easily computed by the user and trusted server using the Chebyshev map without additional burdensome key management. Once the partnered two users are authenticated by the trusted server, they can easily proceed with the agreement of the session key. Formal security analysis demonstrates that the proposed scheme is secure under the random oracle model.http://dx.doi.org/10.1155/2016/3916942
spellingShingle Yousheng Zhou
Junfeng Zhou
Feng Wang
Feng Guo
An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
Applied Computational Intelligence and Soft Computing
title An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
title_full An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
title_fullStr An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
title_full_unstemmed An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
title_short An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
title_sort efficient chaotic map based authentication scheme with mutual anonymity
url http://dx.doi.org/10.1155/2016/3916942
work_keys_str_mv AT youshengzhou anefficientchaoticmapbasedauthenticationschemewithmutualanonymity
AT junfengzhou anefficientchaoticmapbasedauthenticationschemewithmutualanonymity
AT fengwang anefficientchaoticmapbasedauthenticationschemewithmutualanonymity
AT fengguo anefficientchaoticmapbasedauthenticationschemewithmutualanonymity
AT youshengzhou efficientchaoticmapbasedauthenticationschemewithmutualanonymity
AT junfengzhou efficientchaoticmapbasedauthenticationschemewithmutualanonymity
AT fengwang efficientchaoticmapbasedauthenticationschemewithmutualanonymity
AT fengguo efficientchaoticmapbasedauthenticationschemewithmutualanonymity