Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-factor identity authentication method based on chaotic mapping

A chaotic mapping and identity authentication technology, applied in the field of information security, can solve problems such as low efficiency, decreased computational efficiency, and failure to provide security analysis of the original protocol, and achieve the effect of improving security, safe and efficient identity authentication

Active Publication Date: 2019-05-31
PEKING UNIV
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In 2011, Huang et al. in literature 1 (Huang X, Xiang Y, Chonka A, et al.Agenericframework for three-factor authentication: Preserving security and privacy indistributed systems[J].IEEE Trans.Inform.Foren.Secur.,2011, 22(8):1390-1397) proposed a framework for conversion of a two-factor (password + smart card) protocol to a three-factor (password + smart card + biometric) protocol. The basic idea of ​​this framework is that user registration, login and authentication processes are respectively Execute the underlying two-factor protocol twice, the first time using password and smart card as authentication factor, the second time using smart card and biometric as authentication factor, the security of this framework is based on the security of the underlying two-factor protocol, to achieve Basic safety functions are implemented, but the efficiency is severely reduced
Compared with the previous framework, the transmission efficiency of this framework is significantly improved, but the computational efficiency is reduced
[0004] In 2015, Document 3 (Yu J, Wang G, Mu Y, et al.An efficient generic framework for three-factor authentication with provably secure instantiation[J].IEEETrans.Inform.Foren.Secur.,2014,9(12): 2302-2313), Yu et al. pointed out that the error correction technology of the framework of Huang et al. relies on "Hamming distance", "difference set" and "edit distance", and it needs to execute the underlying two-factor protocol twice, so that the efficiency is low and has not been obtained. widely used
[0005] After analysis, the security of the above three frameworks all depend on the security of the original protocol, but did not give a reasonable security analysis of the original protocol; and did not consider the basic "principle of anonymity" and "principle of forward security" , Anonymity and forward security cannot be achieved by relying solely on Hash operations
In addition, the above three frameworks do not consider user-friendliness issues such as "password local update", that is, they cannot achieve a balance between security and efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-factor identity authentication method based on chaotic mapping
  • Multi-factor identity authentication method based on chaotic mapping
  • Multi-factor identity authentication method based on chaotic mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Below in conjunction with accompanying drawing, further describe the present invention through embodiment, but do not limit the scope of the present invention in any way.

[0038] The multi-factor identity authentication protocol based on chaotic mapping designed by the method provided by the present invention is used for user identity authentication, and the existing multi-factor user authentication protocol can be transformed into authentication with security attributes such as anonymity, forward security, and user-friendliness. protocol to achieve safe and efficient multi-factor authentication.

[0039] The user identity authentication process of the present invention includes an initialization stage, a user registration stage, a login authentication stage and a credential update stage. figure 1 Shown is the process of designing and implementing the authentication protocol of the present invention. Below, the protocol published on IEEEInternet ofThings Journal by Ro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-factor identity authentication method based on chaotic mapping. Based on Chebyshev chaotic mapping, user anonymity and forward security are realized by utilizing Chebyshev polynomial semi-group characteristics, and an existing unsafe multi-factor user authentication protocol is converted into an identity authentication protocol with security attributes such as anonymity, forward security and user friendliness. The user identity authentication process comprises an initialization phase, a user registration phase, a login authentication phase and a certificate updating phase. By utilizing the technical scheme provided by the invention, the security of an original protocol can be improved, a secure multi-factor protocol with a password locally and freely updatedis realized, the defects of'attack, improvement, attack, improvement and the like 'in the multi-factor protocol design are terminated, and the secure and efficient multi-factor authentication protocol design is realized.

Description

technical field [0001] The invention belongs to the technical field of information security, relates to a method for realizing a universal and automatically convertible security protocol, in particular to a design of a multi-factor identity authentication protocol and an identity authentication method based on chaotic mapping. Background technique [0002] Under the non-tamper-resistant smart card assumption, design a practical multi-factor authentication protocol that satisfies a series of stringent security goals (such as resistance to smart card loss attack, node capture attack) and ideal properties (such as local password update, user anonymity) is still an unresolved problem. On the one hand, due to the limited computing power, storage space, and battery energy of distributed nodes in smart cards and cloud computing environments, it is very difficult to design identity authentication protocols that take into account security, efficiency, and functional requirements; on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45
Inventor 王平李文婷
Owner PEKING UNIV