Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment

Abstract : Perfect forward secrecy is considered as the most important standard to evaluate a strong authentication scheme. There are many results researched to achieve this property without using hard problems. Recently, the result of Chang et al has some advances such as, the correctness of schemes mutual authentication and session key agreement demonstrated in BAN-logic or the overheads reduction of system implementation. However, in this paper, we prove that their scheme is still vulnerable to impersonation attacks and session key leakage. To overcome those limitations and be practical, we use different notion to propose time efficient scheme conducted in experiment. Our proposed method can be applied for remote user authentication in various scenarios, including systems with user authentication using mobile or wearable devices.
Type de document :
Communication dans un congrès
Hannes Federrath; Dieter Gollmann. 30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. IFIP Advances in Information and Communication Technology, AICT-455, pp.479-494, 2015, ICT Systems Security and Privacy Protection. 〈10.1007/978-3-319-18467-8_32〉
Liste complète des métadonnées

Littérature citée [20 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01345140
Contributeur : Hal Ifip <>
Soumis le : mercredi 13 juillet 2016 - 11:12:21
Dernière modification le : samedi 16 décembre 2017 - 06:54:03

Fichier

337885_1_En_32_Chapter.pdf
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong, Isao Echizen. Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment. Hannes Federrath; Dieter Gollmann. 30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. IFIP Advances in Information and Communication Technology, AICT-455, pp.479-494, 2015, ICT Systems Security and Privacy Protection. 〈10.1007/978-3-319-18467-8_32〉. 〈hal-01345140〉

Partager

Métriques

Consultations de la notice

77

Téléchargements de fichiers

19