An Efficient and Secure Key Agreement Protocol Preserving User Anonymity Under Chebyshev Chaotic Maps

被引:0
作者
Lai, Hong [1 ,2 ]
Luo, Mingxing [3 ]
Tao, Li [1 ,2 ]
Xiao, Fuyuan [1 ,2 ]
Zhan, Cheng [1 ,2 ]
Hu, Xiaofang [1 ,2 ]
机构
[1] Southwest Univ, Sch Comp & Informat Sci, Chongqing 400715, Peoples R China
[2] Southwest Univ, RISE, Chongqing 400715, Peoples R China
[3] Southwest Jiaotong Univ, Informat Secur & Natl Comp Grid Lab, Sch Informat Sci & Technol, Chengdu 610031, Sichuan, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT III | 2018年 / 11065卷
基金
中国国家自然科学基金;
关键词
Key agreement protocol; Chaotic maps; Denial of service attacks; The keyed hashed digests;
D O I
10.1007/978-3-030-00012-7_44
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A type of key agreement protocol based on chaotic maps was proposed in 2009. Soon after the proposal, it was analyzed and improved. Unfortunately, there are still two weaknesses in the two improved protocols. To strengthen the performance of the focused type of protocol, a new improved protocol based on Niu et al.'s protocol is proposed in this paper. Theoretical analysis shows that our improved protocol is immune to denial of service attacks through the keyed hashed digests with either the secret key or the session key. Moreover, modified protocol is more cost-efficient by shifting most computations from on-line to off-line.
引用
收藏
页码:479 / 489
页数:11
相关论文
共 13 条
[1]   Chaotic map based key agreement with/out clock synchronization [J].
Han, S. ;
Chang, E. .
CHAOS SOLITONS & FRACTALS, 2009, 39 (03) :1283-1289
[2]   Security of a key agreement protocol based on chaotic maps [J].
Han, Song .
CHAOS SOLITONS & FRACTALS, 2008, 38 (03) :764-768
[3]   Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol [J].
Lai, Hong ;
Xiao, Jinghua ;
Li, Lixiang ;
Yang, Yixian .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2012, 2012
[4]  
Mason J. C., 2002, CHEBYSHEV POLYNOMIAL
[5]   An anonymous key agreement protocol based on chaotic maps [J].
Niu, Yujun ;
Wang, Xingyuan .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (04) :1986-1992
[6]   Disassembly-oriented assessment methodology for product modularity [J].
Tseng, Hwai-En ;
Chang, Chien-Chen ;
Cheng, Chih-Jen .
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2010, 48 (14) :4297-4320
[7]   A chaotic image encryption algorithm based on perceptron model [J].
Wang, Xing-Yuan ;
Yang, Lei ;
Liu, Rong ;
Kadir, Abdurahman .
NONLINEAR DYNAMICS, 2010, 62 (03) :615-621
[8]   An improved key agreement protocol based on chaos [J].
Wang, Xingyuan ;
Zhao, Jianfeng .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (12) :4052-4057
[9]   A novel key agreement protocol based on chaotic maps [J].
Xiao, Di ;
Liao, Xiaofeng ;
Deng, Shaojiang .
INFORMATION SCIENCES, 2007, 177 (04) :1136-1142
[10]   Security improvement on an anonymous key agreement protocol based on chaotic maps [J].
Xue, Kaiping ;
Hong, Peilin .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (07) :2969-2977