Enhancement authentication protocol using zero-knowledge proofs and chaotic maps

Kai Chain, Kuei Hu Chang, Wen Chung Kuo, Jar Ferr Yang

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Application of authentication protocol and key exchange scheme are major research issues in current internet, and entity identification (users or servers) accuracy and security are thereby safeguarded by various types of verification programs. Therefore, in the last 10 years, it was accompanied with productive discussions, but those discussions mainly focus on single issues, and because of the lack of security, there still existed improvements. The concept of zero-knowledge proofs is well suited for the identification and signing within network system, which has been widely used since proposed in 1985. However, common identification methods are only fit for individual user. In an increasingly complex network environment of today, information is usually conveyed through many unidentified servers, as a result, we have to encrypt messages by adopting different kinds of session keys. As for the chaotic maps technology, it also serves as a new encryption technology, widely adopted in communication protocols and key agreements over the years. As a consequence, in this study, we are going to propose an authentication protocol with key exchange function by taking advantage of characters of zero-knowledge proofs and chaotic maps, as well as adopt the BAN-logic to prove the security of this protocol. This study also compares the results of the security analysis of our protocol and related works. As a result, our proposed protocol has more security than others.

Original languageEnglish
Article numbere2945
JournalInternational Journal of Communication Systems
Volume30
Issue number1
DOIs
Publication statusPublished - 2017 Jan 10

Fingerprint

Authentication
Network protocols
Servers
Complex networks
Cryptography
Internet

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

@article{d11e59b6db12456b9648aa3026ee4bb8,
title = "Enhancement authentication protocol using zero-knowledge proofs and chaotic maps",
abstract = "Application of authentication protocol and key exchange scheme are major research issues in current internet, and entity identification (users or servers) accuracy and security are thereby safeguarded by various types of verification programs. Therefore, in the last 10 years, it was accompanied with productive discussions, but those discussions mainly focus on single issues, and because of the lack of security, there still existed improvements. The concept of zero-knowledge proofs is well suited for the identification and signing within network system, which has been widely used since proposed in 1985. However, common identification methods are only fit for individual user. In an increasingly complex network environment of today, information is usually conveyed through many unidentified servers, as a result, we have to encrypt messages by adopting different kinds of session keys. As for the chaotic maps technology, it also serves as a new encryption technology, widely adopted in communication protocols and key agreements over the years. As a consequence, in this study, we are going to propose an authentication protocol with key exchange function by taking advantage of characters of zero-knowledge proofs and chaotic maps, as well as adopt the BAN-logic to prove the security of this protocol. This study also compares the results of the security analysis of our protocol and related works. As a result, our proposed protocol has more security than others.",
author = "Kai Chain and Chang, {Kuei Hu} and Kuo, {Wen Chung} and Yang, {Jar Ferr}",
year = "2017",
month = "1",
day = "10",
doi = "10.1002/dac.2945",
language = "English",
volume = "30",
journal = "International Journal of Communication Systems",
issn = "1074-5351",
publisher = "John Wiley and Sons Ltd",
number = "1",

}

Enhancement authentication protocol using zero-knowledge proofs and chaotic maps. / Chain, Kai; Chang, Kuei Hu; Kuo, Wen Chung; Yang, Jar Ferr.

In: International Journal of Communication Systems, Vol. 30, No. 1, e2945, 10.01.2017.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Enhancement authentication protocol using zero-knowledge proofs and chaotic maps

AU - Chain, Kai

AU - Chang, Kuei Hu

AU - Kuo, Wen Chung

AU - Yang, Jar Ferr

PY - 2017/1/10

Y1 - 2017/1/10

N2 - Application of authentication protocol and key exchange scheme are major research issues in current internet, and entity identification (users or servers) accuracy and security are thereby safeguarded by various types of verification programs. Therefore, in the last 10 years, it was accompanied with productive discussions, but those discussions mainly focus on single issues, and because of the lack of security, there still existed improvements. The concept of zero-knowledge proofs is well suited for the identification and signing within network system, which has been widely used since proposed in 1985. However, common identification methods are only fit for individual user. In an increasingly complex network environment of today, information is usually conveyed through many unidentified servers, as a result, we have to encrypt messages by adopting different kinds of session keys. As for the chaotic maps technology, it also serves as a new encryption technology, widely adopted in communication protocols and key agreements over the years. As a consequence, in this study, we are going to propose an authentication protocol with key exchange function by taking advantage of characters of zero-knowledge proofs and chaotic maps, as well as adopt the BAN-logic to prove the security of this protocol. This study also compares the results of the security analysis of our protocol and related works. As a result, our proposed protocol has more security than others.

AB - Application of authentication protocol and key exchange scheme are major research issues in current internet, and entity identification (users or servers) accuracy and security are thereby safeguarded by various types of verification programs. Therefore, in the last 10 years, it was accompanied with productive discussions, but those discussions mainly focus on single issues, and because of the lack of security, there still existed improvements. The concept of zero-knowledge proofs is well suited for the identification and signing within network system, which has been widely used since proposed in 1985. However, common identification methods are only fit for individual user. In an increasingly complex network environment of today, information is usually conveyed through many unidentified servers, as a result, we have to encrypt messages by adopting different kinds of session keys. As for the chaotic maps technology, it also serves as a new encryption technology, widely adopted in communication protocols and key agreements over the years. As a consequence, in this study, we are going to propose an authentication protocol with key exchange function by taking advantage of characters of zero-knowledge proofs and chaotic maps, as well as adopt the BAN-logic to prove the security of this protocol. This study also compares the results of the security analysis of our protocol and related works. As a result, our proposed protocol has more security than others.

UR - http://www.scopus.com/inward/record.url?scp=85006113581&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85006113581&partnerID=8YFLogxK

U2 - 10.1002/dac.2945

DO - 10.1002/dac.2945

M3 - Article

AN - SCOPUS:85006113581

VL - 30

JO - International Journal of Communication Systems

JF - International Journal of Communication Systems

SN - 1074-5351

IS - 1

M1 - e2945

ER -