Blog
About

10
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.

          Related collections

          Most cited references 44

          • Record: found
          • Abstract: not found
          • Article: not found

          A logic of authentication

            Bookmark
            • Record: found
            • Abstract: found
            • Article: not found

            A secure authentication scheme for telecare medicine information systems.

            The telecare medicine information system enables or supports health-care delivery services. In recent years, the increased availability of lower-cost telecommunications systems and custom made physiological monitoring devices for patients have made it possible to bring the advantages of telemedicine directly into the patient's home. These systems are moving towards an environment where automated patient medical records and electronically interconnected telecare facilities are prevalent. A secure authentication scheme will thus be needed to safeguard data integrity, confidentiality, and availability. Many schemes based on cryptography have been proposed for the goals. However, much of the schemes are vulnerable to various attacks, and are neither efficient, nor user friendly. Specially, in terms of efficiency, some schemes need the exponential computation resulting in high time cost. Therefore, we propose a novel authentication scheme that is added the pre-computing idea within the communication process to avoid the time-consuming exponential computations. Finally, it is shown to be more secure and practical for telecare medicine environments.
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

                Bookmark

                Author and article information

                Contributors
                Role: Formal analysisRole: Funding acquisitionRole: InvestigationRole: MethodologyRole: Project administrationRole: Writing – original draftRole: Writing – review & editing
                Role: Funding acquisitionRole: InvestigationRole: ResourcesRole: SupervisionRole: Validation
                Role: Data curationRole: InvestigationRole: MethodologyRole: Writing – original draft
                Role: Formal analysisRole: ValidationRole: Writing – original draftRole: Writing – review & editing
                Role: Editor
                Journal
                PLoS One
                PLoS ONE
                plos
                plosone
                PLoS ONE
                Public Library of Science (San Francisco, CA USA )
                1932-6203
                31 July 2017
                2017
                : 12
                : 7
                Affiliations
                [1 ] Department of Medical Informatics, Tzu Chi University, Hualien, Taiwan, ROC
                [2 ] Department of Medical Informatics, Institute of Medical Sciences, Tzu Chi University, Hualien, Taiwan, ROC
                [3 ] Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, Taichung, Taiwan, ROC
                King Saud University, SAUDI ARABIA
                Author notes

                Competing Interests: The authors have declared that no competing interests exist.

                Article
                PONE-D-16-47519
                10.1371/journal.pone.0181744
                5536435
                28759615
                © 2017 Lee et al

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

                Counts
                Figures: 2, Tables: 4, Pages: 20
                Product
                Funding
                Funded by: funder-id http://dx.doi.org/10.13039/501100004663, Ministry of Science and Technology, Taiwan;
                Award ID: MOST 105-2221-E-320-003
                Award Recipient :
                Funded by: funder-id http://dx.doi.org/10.13039/100009383, Tzu Chi University;
                Award ID: TCRPP105004
                Award Recipient :
                This research was supported by Ministry of Science and Technology under the grants MOST 105-2221-E-320-003 and Tzu Chi University under the grants TCRPP105004.
                Categories
                Research Article
                People and Places
                Population Groupings
                Religious Faiths
                Islam
                Computer and Information Sciences
                Cryptography
                Physical Sciences
                Mathematics
                Cryptography
                Physical Sciences
                Mathematics
                Algebra
                Polynomials
                Computer and Information Sciences
                Computer Networks
                Physical Sciences
                Mathematics
                Algebra
                Algebraic Geometry
                Physical Sciences
                Mathematics
                Applied Mathematics
                Algorithms
                Research and Analysis Methods
                Simulation and Modeling
                Algorithms
                Physical Sciences
                Mathematics
                Arithmetic
                Physical Sciences
                Mathematics
                Probability Theory
                Probability Distribution
                Custom metadata
                All relevant data are within the paper.

                Uncategorized

                Comments

                Comment on this article