Loading…

Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment

With nonstop development of communication technologies, all aspects of social life continuously change and so do network systems. When establishing connection is easy, the convenience of online-service receives many users’ attentions, for example, the patients directly access medical system to be ad...

Full description

Saved in:
Bibliographic Details
Published in:Security and communication networks 2019-01, Vol.2019 (2019), p.1-11
Main Authors: Truong, Toan-Thinh, Duong, Anh-Duc, Tran, Minh-Triet
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3
cites cdi_FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3
container_end_page 11
container_issue 2019
container_start_page 1
container_title Security and communication networks
container_volume 2019
creator Truong, Toan-Thinh
Duong, Anh-Duc
Tran, Minh-Triet
description With nonstop development of communication technologies, all aspects of social life continuously change and so do network systems. When establishing connection is easy, the convenience of online-service receives many users’ attentions, for example, the patients directly access medical system to be advised by doctors at any time. Therefore, user authentication scheme is necessary when we want to provide privacy and security for working sessions. Storing a password list for verification is an old method and not secure. This list can be easily leaked, and adversary can launch an offline password-guessing attack. In addition, information exchanged between user and server needs being prevented from attacker’s decryption. It can be said that current authentication schemes are unsuitable for new security standard. We need a strong user authentication scheme using new approach to overcome existing limitations and guarantee time efficiency. In this paper, we make a design with Chebyshev polynomial to achieve our goals and resist some kinds of attacks.
doi_str_mv 10.1155/2019/4250743
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455788519</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455788519</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3</originalsourceid><addsrcrecordid>eNqFkMFLwzAUxoMoOKc3z1LwqHUvaZK2x1mmDgYKUzyWNElpxprOpKvsvzdjQ4-e3uN7v_ce34fQNYYHjBmbEMD5hBIGKU1O0AjnSR4DJuT0t8f0HF14vwLgmKZ0hD7n7cZ1g1ZR0ehq5xs9RG_deme71oi1jx-FD7Pptm-07Y0UvelstJSNbnVkbFSsTdDjpXaDdtHMDsZ1tg3SJTqrw76-OtYx-niavRcv8eL1eV5MF7FMOPSxAKhqIlPCsjzVwClXgkmcKyGFVClJuGCVqFVOOVSUZorJigPkkueqYplIxuj2cDe4-Npq35erbutseFkSyliaZSxYH6P7AyVd573TdblxphVuV2Io99GV--jKY3QBvzvgjbFKfJv_6JsDrQOja_FHEwyUQPID-4t4Yg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455788519</pqid></control><display><type>article</type><title>Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment</title><source>Open Access: Wiley-Blackwell Open Access Journals</source><source>Publicly Available Content Database</source><creator>Truong, Toan-Thinh ; Duong, Anh-Duc ; Tran, Minh-Triet</creator><contributor>Palomar, Esther ; Esther Palomar</contributor><creatorcontrib>Truong, Toan-Thinh ; Duong, Anh-Duc ; Tran, Minh-Triet ; Palomar, Esther ; Esther Palomar</creatorcontrib><description>With nonstop development of communication technologies, all aspects of social life continuously change and so do network systems. When establishing connection is easy, the convenience of online-service receives many users’ attentions, for example, the patients directly access medical system to be advised by doctors at any time. Therefore, user authentication scheme is necessary when we want to provide privacy and security for working sessions. Storing a password list for verification is an old method and not secure. This list can be easily leaked, and adversary can launch an offline password-guessing attack. In addition, information exchanged between user and server needs being prevented from attacker’s decryption. It can be said that current authentication schemes are unsuitable for new security standard. We need a strong user authentication scheme using new approach to overcome existing limitations and guarantee time efficiency. In this paper, we make a design with Chebyshev polynomial to achieve our goals and resist some kinds of attacks.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2019/4250743</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Authentication ; Chebyshev approximation ; Cryptography ; Data encryption ; Encryption ; Passwords ; Physicians ; Polynomials ; Prime numbers ; Registration ; Security ; Servers</subject><ispartof>Security and communication networks, 2019-01, Vol.2019 (2019), p.1-11</ispartof><rights>Copyright © 2019 Toan-Thinh Truong et al.</rights><rights>Copyright © 2019 Toan-Thinh Truong et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3</citedby><cites>FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3</cites><orcidid>0000-0002-8308-008X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2455788519?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,25731,27901,27902,36989,44566</link.rule.ids></links><search><contributor>Palomar, Esther</contributor><contributor>Esther Palomar</contributor><creatorcontrib>Truong, Toan-Thinh</creatorcontrib><creatorcontrib>Duong, Anh-Duc</creatorcontrib><creatorcontrib>Tran, Minh-Triet</creatorcontrib><title>Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment</title><title>Security and communication networks</title><description>With nonstop development of communication technologies, all aspects of social life continuously change and so do network systems. When establishing connection is easy, the convenience of online-service receives many users’ attentions, for example, the patients directly access medical system to be advised by doctors at any time. Therefore, user authentication scheme is necessary when we want to provide privacy and security for working sessions. Storing a password list for verification is an old method and not secure. This list can be easily leaked, and adversary can launch an offline password-guessing attack. In addition, information exchanged between user and server needs being prevented from attacker’s decryption. It can be said that current authentication schemes are unsuitable for new security standard. We need a strong user authentication scheme using new approach to overcome existing limitations and guarantee time efficiency. In this paper, we make a design with Chebyshev polynomial to achieve our goals and resist some kinds of attacks.</description><subject>Authentication</subject><subject>Chebyshev approximation</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Encryption</subject><subject>Passwords</subject><subject>Physicians</subject><subject>Polynomials</subject><subject>Prime numbers</subject><subject>Registration</subject><subject>Security</subject><subject>Servers</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNqFkMFLwzAUxoMoOKc3z1LwqHUvaZK2x1mmDgYKUzyWNElpxprOpKvsvzdjQ4-e3uN7v_ce34fQNYYHjBmbEMD5hBIGKU1O0AjnSR4DJuT0t8f0HF14vwLgmKZ0hD7n7cZ1g1ZR0ehq5xs9RG_deme71oi1jx-FD7Pptm-07Y0UvelstJSNbnVkbFSsTdDjpXaDdtHMDsZ1tg3SJTqrw76-OtYx-niavRcv8eL1eV5MF7FMOPSxAKhqIlPCsjzVwClXgkmcKyGFVClJuGCVqFVOOVSUZorJigPkkueqYplIxuj2cDe4-Npq35erbutseFkSyliaZSxYH6P7AyVd573TdblxphVuV2Io99GV--jKY3QBvzvgjbFKfJv_6JsDrQOja_FHEwyUQPID-4t4Yg</recordid><startdate>20190101</startdate><enddate>20190101</enddate><creator>Truong, Toan-Thinh</creator><creator>Duong, Anh-Duc</creator><creator>Tran, Minh-Triet</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-8308-008X</orcidid></search><sort><creationdate>20190101</creationdate><title>Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment</title><author>Truong, Toan-Thinh ; Duong, Anh-Duc ; Tran, Minh-Triet</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Authentication</topic><topic>Chebyshev approximation</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Encryption</topic><topic>Passwords</topic><topic>Physicians</topic><topic>Polynomials</topic><topic>Prime numbers</topic><topic>Registration</topic><topic>Security</topic><topic>Servers</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Truong, Toan-Thinh</creatorcontrib><creatorcontrib>Duong, Anh-Duc</creatorcontrib><creatorcontrib>Tran, Minh-Triet</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Truong, Toan-Thinh</au><au>Duong, Anh-Duc</au><au>Tran, Minh-Triet</au><au>Palomar, Esther</au><au>Esther Palomar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment</atitle><jtitle>Security and communication networks</jtitle><date>2019-01-01</date><risdate>2019</risdate><volume>2019</volume><issue>2019</issue><spage>1</spage><epage>11</epage><pages>1-11</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>With nonstop development of communication technologies, all aspects of social life continuously change and so do network systems. When establishing connection is easy, the convenience of online-service receives many users’ attentions, for example, the patients directly access medical system to be advised by doctors at any time. Therefore, user authentication scheme is necessary when we want to provide privacy and security for working sessions. Storing a password list for verification is an old method and not secure. This list can be easily leaked, and adversary can launch an offline password-guessing attack. In addition, information exchanged between user and server needs being prevented from attacker’s decryption. It can be said that current authentication schemes are unsuitable for new security standard. We need a strong user authentication scheme using new approach to overcome existing limitations and guarantee time efficiency. In this paper, we make a design with Chebyshev polynomial to achieve our goals and resist some kinds of attacks.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2019/4250743</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-8308-008X</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2019-01, Vol.2019 (2019), p.1-11
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2455788519
source Open Access: Wiley-Blackwell Open Access Journals; Publicly Available Content Database
subjects Authentication
Chebyshev approximation
Cryptography
Data encryption
Encryption
Passwords
Physicians
Polynomials
Prime numbers
Registration
Security
Servers
title Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T07%3A42%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Improved%20Chebyshev%20Polynomials-Based%20Authentication%20Scheme%20in%20Client-Server%20Environment&rft.jtitle=Security%20and%20communication%20networks&rft.au=Truong,%20Toan-Thinh&rft.date=2019-01-01&rft.volume=2019&rft.issue=2019&rft.spage=1&rft.epage=11&rft.pages=1-11&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2019/4250743&rft_dat=%3Cproquest_cross%3E2455788519%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c360t-a00bf2c725897e0646da5c19dacacd7236a5bafd9460b448d5cb6009c69db58a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2455788519&rft_id=info:pmid/&rfr_iscdi=true