An authentication scheme for multi-server environments based on chaotic maps Online publication date: Thu, 30-Jun-2016
by Yun Tao
International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. 8, No. 3, 2016
Abstract: In the present e-commerce and e-government era, user authentication schemes have become more and more important, through which the user and the server could authenticate each other and generate a session key to encrypt the message. The extended chaotic map is very suitable for the cryptography since there are subtle and close relationships between the properties of traditional cryptosystems and chaotic systems. Recently, many extended chaotic maps-based authentication schemes have been proposed for different applications. However, most of them are designed for a single server environment and result in users needing to register many times when they want to access different application servers. Besides, the only two extended chaotic maps-based authentication schemes for multi-server environment suffer from security vulnerability. In this paper, we proposed a new user authentication scheme for multi-server environments using extended chaotic maps. We also give a proof that the security of the proposed scheme could withstand various attacks and satisfy other requirements in multi-server environments.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Security and Digital Forensics (IJESDF):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com