{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T05:18:08Z","timestamp":1712985488680},"reference-count":41,"publisher":"Wiley","issue":"9","license":[{"start":{"date-parts":[[2016,2,29]],"date-time":"2016-02-29T00:00:00Z","timestamp":1456704000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2016,6]]},"abstract":"Summary<\/jats:title>Chebyshev chaotic map is an important tool used in the domain of cryptography to develop different schemes for numerous applications. In 2014, Lin put forwarded a mobile user authentication system using dynamic identity and chaotic map. Lin declared that the scheme offers mutual authentication and session key agreement between user and server. Moreover, they stated that the scheme offers user anonymity and resilience against known attacks. However, we carefully examined Lin's scheme and found that it is no longer usable for practical applications as (i) it has no facility to identify the wrong password and identity, which are inputted by the user during login and password update phases, (ii) it has no facility to protect user impersonation attack, and (iii) it has the problem of session key forward secrecy. We put forwarded an enhanced scheme based on extended chaotic map to repair the fragilities of Lin's scheme. We formally examined the security of our scheme and demonstrated that it is provably secured in random oracle model. Further, we presented some informal cryptanalysis to make sure that the enhanced scheme is secure from known attacks. Our scheme is also computation efficient against other competitive protocols. Copyright \u00a9 2016 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/dac.3126","type":"journal-article","created":{"date-parts":[[2016,2,29]],"date-time":"2016-02-29T13:36:41Z","timestamp":1456753001000},"page":"1529-1544","source":"Crossref","is-referenced-by-count":28,"title":["An anonymous and provably secure authentication scheme for mobile user"],"prefix":"10.1002","volume":"29","author":[{"given":"SK Hafizul","family":"Islam","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Systems Birla Institute of Technology and Science Pilani Campus Rajasthan 333031 India"}]},{"given":"Mohammad S.","family":"Obaidat","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science Fordham University 441 East Fordham Road, JMH 340 Bronx New York 10458 USA"}]},{"given":"Ruhul","family":"Amin","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering Indian School of Mines Dhanbad 826004 Jharkhand India"}]}],"member":"311","published-online":{"date-parts":[[2016,2,29]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.02.010"},{"key":"e_1_2_11_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010518"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0346-9"},{"key":"e_1_2_11_5_1","doi-asserted-by":"crossref","unstructured":"AminR IslamSH BiswasGP KhanMK.An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.2015 International Conference on Cyber Situational Awareness Data Analytics and Assessment (CyberSA) London United Kingdom 2015;1\u20137.","DOI":"10.1109\/CyberSA.2015.7166114"},{"key":"e_1_2_11_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.01.001"},{"key":"e_1_2_11_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0351-y"},{"issue":"8","key":"e_1_2_11_8_1","first-page":"1","article-title":"An improved RSA based user authentication and session key agreement protocol usable in TMIS","volume":"39","author":"Amin R","year":"2015","journal-title":"Journal of Medical Systems"},{"key":"e_1_2_11_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1158"},{"issue":"3","key":"e_1_2_11_10_1","first-page":"1989","article-title":"A more secure authentication scheme for telecare medicine information systems","volume":"36","author":"He D","year":"2011","journal-title":"Journal of Medical Systems"},{"key":"e_1_2_11_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.011"},{"key":"e_1_2_11_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2428"},{"key":"e_1_2_11_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.05.020"},{"key":"e_1_2_11_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.315"},{"key":"e_1_2_11_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0628-3"},{"key":"e_1_2_11_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0335-0"},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2015.08.002"},{"key":"e_1_2_11_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.01.017"},{"key":"e_1_2_11_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-011-0247-4"},{"key":"e_1_2_11_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0652-3"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.07.026"},{"key":"e_1_2_11_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1020-7"},{"key":"e_1_2_11_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1304-6"},{"key":"e_1_2_11_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2011.11.025"},{"key":"e_1_2_11_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2012.09.032"},{"key":"e_1_2_11_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1204-1"},{"key":"e_1_2_11_27_1","doi-asserted-by":"crossref","unstructured":"HanS TsengH JanR YangW.A chaotic maps\u2010based key agreement protocol that preserves user anonymity.Proceedings of the IEEE International Conference on Communications (ICC'09) Dresden Germany 2009;1\u20136.","DOI":"10.1109\/ICC.2009.5198581"},{"key":"e_1_2_11_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2010.08.015"},{"key":"e_1_2_11_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2011.11.010"},{"key":"e_1_2_11_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2011.11.025"},{"key":"e_1_2_11_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0715-5"},{"key":"e_1_2_11_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1829-5"},{"key":"e_1_2_11_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"e_1_2_11_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7_394"},{"key":"e_1_2_11_35_1","doi-asserted-by":"crossref","unstructured":"KocheP JaffeJ JunB.Differential power analysis.Proceedings of the Advances in Cryptology (Crypto'99) Vol.\u00a01666 Santa Barbara California USA 1999;388\u2013397.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_2_11_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2005.851701"},{"key":"e_1_2_11_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.09.047"},{"key":"e_1_2_11_38_1","doi-asserted-by":"crossref","unstructured":"BallareM Rogaway P.Random oracles are practical: a paradigm for designing efficient protocols.Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS'93) Fairfax VA USA 1993;62\u201373.","DOI":"10.1145\/168588.168596"},{"key":"e_1_2_11_39_1","article-title":"Sequences of Games: A Tool for Taming Complexity in Security Proofs","author":"Shoup V","journal-title":"Cryptology ePrint Archieve"},{"key":"e_1_2_11_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.09.006"},{"key":"e_1_2_11_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2031942"},{"key":"e_1_2_11_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2378-2"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.3126","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.3126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T10:20:33Z","timestamp":1696587633000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.3126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,29]]},"references-count":41,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["10.1002\/dac.3126"],"URL":"https:\/\/doi.org\/10.1002\/dac.3126","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,29]]}}}