Efficient three-party authenticated key agreement protocol based on chaotic map
Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password relate...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-06-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00060 |
_version_ | 1828748083866894336 |
---|---|
author | Xiong LI,Jun-guo LIAO,Yu-zhen LIU Fan WU |
author_facet | Xiong LI,Jun-guo LIAO,Yu-zhen LIU Fan WU |
author_sort | Xiong LI,Jun-guo LIAO,Yu-zhen LIU |
collection | DOAJ |
description | Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly. |
first_indexed | 2024-04-14T04:55:05Z |
format | Article |
id | doaj.art-8705474abe0746cb86f5d24872b75e57 |
institution | Directory Open Access Journal |
issn | 2096-109X |
language | English |
last_indexed | 2024-04-14T04:55:05Z |
publishDate | 2016-06-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj.art-8705474abe0746cb86f5d24872b75e572022-12-22T02:11:11ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-06-0126132110.11959/j.issn.2096-109x.2016.00060Efficient three-party authenticated key agreement protocol based on chaotic mapXiong LI,Jun-guo LIAO,Yu-zhen LIU0Fan WU1School of Computer Science and Engineering,Hunan University of Science and Technology,Xiangtan 411201,ChinaDepartment of Computer Science and Engineering,Xiamen Institute of Technology,Xiamen 361021,ChinaChaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00060chaotic mapskey agreementauthenticationpassword |
spellingShingle | Xiong LI,Jun-guo LIAO,Yu-zhen LIU Fan WU Efficient three-party authenticated key agreement protocol based on chaotic map 网络与信息安全学报 chaotic maps key agreement authentication password |
title | Efficient three-party authenticated key agreement protocol based on chaotic map |
title_full | Efficient three-party authenticated key agreement protocol based on chaotic map |
title_fullStr | Efficient three-party authenticated key agreement protocol based on chaotic map |
title_full_unstemmed | Efficient three-party authenticated key agreement protocol based on chaotic map |
title_short | Efficient three-party authenticated key agreement protocol based on chaotic map |
title_sort | efficient three party authenticated key agreement protocol based on chaotic map |
topic | chaotic maps key agreement authentication password |
url | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00060 |
work_keys_str_mv | AT xionglijunguoliaoyuzhenliu efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap AT fanwu efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap |