Efficient and secure three-factor user authentication and key agreement using chaotic maps

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

User authentication and key agreement are essential for implementing secure wireless communication, especially in mobile devices. Many authentication and key agreement schemes are based on both the smart card and the password. Unfortunately, most of these schemes are vulnerable, such as password guessing attack and smart card loss attack. Recently, Han et al. proposed a three-factor key agreement and authentication scheme by using fuzzy extractor and chaotic maps. However, it is proved that Han et al.’s scheme can not protect user anonymity and involves some redundant operations. To address the security defects, we proposed an improved user authentication and key agreement scheme. Although our scheme incurs slightly delay than others, it can resist various attacks. Moreover, our scheme is efficient for practical application deployments compared with other previously proposed user authentication schemes.

Cite

CITATION STYLE

APA

Hu, J., Xu, Z., He, D., Zeadally, S., & Choo, K. K. R. (2019). Efficient and secure three-factor user authentication and key agreement using chaotic maps. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11982 LNCS, pp. 186–202). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-37337-5_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free