Loading…
Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment
With nonstop development of communication technologies, all aspects of social life continuously change and so do network systems. When establishing connection is easy, the convenience of online-service receives many users’ attentions, for example, the patients directly access medical system to be ad...
Saved in:
Published in: | Security and communication networks 2019-01, Vol.2019 (2019), p.1-11 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3 |
---|---|
cites | cdi_FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3 |
container_end_page | 11 |
container_issue | 2019 |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2019 |
creator | Truong, Toan-Thinh Duong, Anh-Duc Tran, Minh-Triet |
description | With nonstop development of communication technologies, all aspects of social life continuously change and so do network systems. When establishing connection is easy, the convenience of online-service receives many users’ attentions, for example, the patients directly access medical system to be advised by doctors at any time. Therefore, user authentication scheme is necessary when we want to provide privacy and security for working sessions. Storing a password list for verification is an old method and not secure. This list can be easily leaked, and adversary can launch an offline password-guessing attack. In addition, information exchanged between user and server needs being prevented from attacker’s decryption. It can be said that current authentication schemes are unsuitable for new security standard. We need a strong user authentication scheme using new approach to overcome existing limitations and guarantee time efficiency. In this paper, we make a design with Chebyshev polynomial to achieve our goals and resist some kinds of attacks. |
doi_str_mv | 10.1155/2019/4250743 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455788519</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455788519</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3</originalsourceid><addsrcrecordid>eNqFkMFLwzAUxoMoOKc3z1LwqHUvaZK2x1mmDgYKUzyWNElpxprOpKvsvzdjQ4-e3uN7v_ce34fQNYYHjBmbEMD5hBIGKU1O0AjnSR4DJuT0t8f0HF14vwLgmKZ0hD7n7cZ1g1ZR0ehq5xs9RG_deme71oi1jx-FD7Pptm-07Y0UvelstJSNbnVkbFSsTdDjpXaDdtHMDsZ1tg3SJTqrw76-OtYx-niavRcv8eL1eV5MF7FMOPSxAKhqIlPCsjzVwClXgkmcKyGFVClJuGCVqFVOOVSUZorJigPkkueqYplIxuj2cDe4-Npq35erbutseFkSyliaZSxYH6P7AyVd573TdblxphVuV2Io99GV--jKY3QBvzvgjbFKfJv_6JsDrQOja_FHEwyUQPID-4t4Yg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455788519</pqid></control><display><type>article</type><title>Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment</title><source>Open Access: Wiley-Blackwell Open Access Journals</source><source>Publicly Available Content Database</source><creator>Truong, Toan-Thinh ; Duong, Anh-Duc ; Tran, Minh-Triet</creator><contributor>Palomar, Esther ; Esther Palomar</contributor><creatorcontrib>Truong, Toan-Thinh ; Duong, Anh-Duc ; Tran, Minh-Triet ; Palomar, Esther ; Esther Palomar</creatorcontrib><description>With nonstop development of communication technologies, all aspects of social life continuously change and so do network systems. When establishing connection is easy, the convenience of online-service receives many users’ attentions, for example, the patients directly access medical system to be advised by doctors at any time. Therefore, user authentication scheme is necessary when we want to provide privacy and security for working sessions. Storing a password list for verification is an old method and not secure. This list can be easily leaked, and adversary can launch an offline password-guessing attack. In addition, information exchanged between user and server needs being prevented from attacker’s decryption. It can be said that current authentication schemes are unsuitable for new security standard. We need a strong user authentication scheme using new approach to overcome existing limitations and guarantee time efficiency. In this paper, we make a design with Chebyshev polynomial to achieve our goals and resist some kinds of attacks.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2019/4250743</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Authentication ; Chebyshev approximation ; Cryptography ; Data encryption ; Encryption ; Passwords ; Physicians ; Polynomials ; Prime numbers ; Registration ; Security ; Servers</subject><ispartof>Security and communication networks, 2019-01, Vol.2019 (2019), p.1-11</ispartof><rights>Copyright © 2019 Toan-Thinh Truong et al.</rights><rights>Copyright © 2019 Toan-Thinh Truong et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3</citedby><cites>FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3</cites><orcidid>0000-0002-8308-008X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2455788519?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,25731,27901,27902,36989,44566</link.rule.ids></links><search><contributor>Palomar, Esther</contributor><contributor>Esther Palomar</contributor><creatorcontrib>Truong, Toan-Thinh</creatorcontrib><creatorcontrib>Duong, Anh-Duc</creatorcontrib><creatorcontrib>Tran, Minh-Triet</creatorcontrib><title>Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment</title><title>Security and communication networks</title><description>With nonstop development of communication technologies, all aspects of social life continuously change and so do network systems. When establishing connection is easy, the convenience of online-service receives many users’ attentions, for example, the patients directly access medical system to be advised by doctors at any time. Therefore, user authentication scheme is necessary when we want to provide privacy and security for working sessions. Storing a password list for verification is an old method and not secure. This list can be easily leaked, and adversary can launch an offline password-guessing attack. In addition, information exchanged between user and server needs being prevented from attacker’s decryption. It can be said that current authentication schemes are unsuitable for new security standard. We need a strong user authentication scheme using new approach to overcome existing limitations and guarantee time efficiency. In this paper, we make a design with Chebyshev polynomial to achieve our goals and resist some kinds of attacks.</description><subject>Authentication</subject><subject>Chebyshev approximation</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Encryption</subject><subject>Passwords</subject><subject>Physicians</subject><subject>Polynomials</subject><subject>Prime numbers</subject><subject>Registration</subject><subject>Security</subject><subject>Servers</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNqFkMFLwzAUxoMoOKc3z1LwqHUvaZK2x1mmDgYKUzyWNElpxprOpKvsvzdjQ4-e3uN7v_ce34fQNYYHjBmbEMD5hBIGKU1O0AjnSR4DJuT0t8f0HF14vwLgmKZ0hD7n7cZ1g1ZR0ehq5xs9RG_deme71oi1jx-FD7Pptm-07Y0UvelstJSNbnVkbFSsTdDjpXaDdtHMDsZ1tg3SJTqrw76-OtYx-niavRcv8eL1eV5MF7FMOPSxAKhqIlPCsjzVwClXgkmcKyGFVClJuGCVqFVOOVSUZorJigPkkueqYplIxuj2cDe4-Npq35erbutseFkSyliaZSxYH6P7AyVd573TdblxphVuV2Io99GV--jKY3QBvzvgjbFKfJv_6JsDrQOja_FHEwyUQPID-4t4Yg</recordid><startdate>20190101</startdate><enddate>20190101</enddate><creator>Truong, Toan-Thinh</creator><creator>Duong, Anh-Duc</creator><creator>Tran, Minh-Triet</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-8308-008X</orcidid></search><sort><creationdate>20190101</creationdate><title>Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment</title><author>Truong, Toan-Thinh ; Duong, Anh-Duc ; Tran, Minh-Triet</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Authentication</topic><topic>Chebyshev approximation</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Encryption</topic><topic>Passwords</topic><topic>Physicians</topic><topic>Polynomials</topic><topic>Prime numbers</topic><topic>Registration</topic><topic>Security</topic><topic>Servers</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Truong, Toan-Thinh</creatorcontrib><creatorcontrib>Duong, Anh-Duc</creatorcontrib><creatorcontrib>Tran, Minh-Triet</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Truong, Toan-Thinh</au><au>Duong, Anh-Duc</au><au>Tran, Minh-Triet</au><au>Palomar, Esther</au><au>Esther Palomar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment</atitle><jtitle>Security and communication networks</jtitle><date>2019-01-01</date><risdate>2019</risdate><volume>2019</volume><issue>2019</issue><spage>1</spage><epage>11</epage><pages>1-11</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>With nonstop development of communication technologies, all aspects of social life continuously change and so do network systems. When establishing connection is easy, the convenience of online-service receives many users’ attentions, for example, the patients directly access medical system to be advised by doctors at any time. Therefore, user authentication scheme is necessary when we want to provide privacy and security for working sessions. Storing a password list for verification is an old method and not secure. This list can be easily leaked, and adversary can launch an offline password-guessing attack. In addition, information exchanged between user and server needs being prevented from attacker’s decryption. It can be said that current authentication schemes are unsuitable for new security standard. We need a strong user authentication scheme using new approach to overcome existing limitations and guarantee time efficiency. In this paper, we make a design with Chebyshev polynomial to achieve our goals and resist some kinds of attacks.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2019/4250743</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-8308-008X</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2019-01, Vol.2019 (2019), p.1-11 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2455788519 |
source | Open Access: Wiley-Blackwell Open Access Journals; Publicly Available Content Database |
subjects | Authentication Chebyshev approximation Cryptography Data encryption Encryption Passwords Physicians Polynomials Prime numbers Registration Security Servers |
title | Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T07%3A42%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Improved%20Chebyshev%20Polynomials-Based%20Authentication%20Scheme%20in%20Client-Server%20Environment&rft.jtitle=Security%20and%20communication%20networks&rft.au=Truong,%20Toan-Thinh&rft.date=2019-01-01&rft.volume=2019&rft.issue=2019&rft.spage=1&rft.epage=11&rft.pages=1-11&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2019/4250743&rft_dat=%3Cproquest_cross%3E2455788519%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2455788519&rft_id=info:pmid/&rfr_iscdi=true |