Efficient three-party authenticated key agreement protocol based on chaotic map

Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password relate...

Full description

Bibliographic Details
Main Authors: Xiong LI,Jun-guo LIAO,Yu-zhen LIU, Fan WU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2016-06-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00060
_version_ 1828748083866894336
author Xiong LI,Jun-guo LIAO,Yu-zhen LIU
Fan WU
author_facet Xiong LI,Jun-guo LIAO,Yu-zhen LIU
Fan WU
author_sort Xiong LI,Jun-guo LIAO,Yu-zhen LIU
collection DOAJ
description Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly.
first_indexed 2024-04-14T04:55:05Z
format Article
id doaj.art-8705474abe0746cb86f5d24872b75e57
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-04-14T04:55:05Z
publishDate 2016-06-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-8705474abe0746cb86f5d24872b75e572022-12-22T02:11:11ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-06-0126132110.11959/j.issn.2096-109x.2016.00060Efficient three-party authenticated key agreement protocol based on chaotic mapXiong LI,Jun-guo LIAO,Yu-zhen LIU0Fan WU1School of Computer Science and Engineering,Hunan University of Science and Technology,Xiangtan 411201,ChinaDepartment of Computer Science and Engineering,Xiamen Institute of Technology,Xiamen 361021,ChinaChaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00060chaotic mapskey agreementauthenticationpassword
spellingShingle Xiong LI,Jun-guo LIAO,Yu-zhen LIU
Fan WU
Efficient three-party authenticated key agreement protocol based on chaotic map
网络与信息安全学报
chaotic maps
key agreement
authentication
password
title Efficient three-party authenticated key agreement protocol based on chaotic map
title_full Efficient three-party authenticated key agreement protocol based on chaotic map
title_fullStr Efficient three-party authenticated key agreement protocol based on chaotic map
title_full_unstemmed Efficient three-party authenticated key agreement protocol based on chaotic map
title_short Efficient three-party authenticated key agreement protocol based on chaotic map
title_sort efficient three party authenticated key agreement protocol based on chaotic map
topic chaotic maps
key agreement
authentication
password
url http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00060
work_keys_str_mv AT xionglijunguoliaoyuzhenliu efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap
AT fanwu efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap