A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps

被引:61
|
作者
Lee, Cheng-Chi [1 ,2 ]
Li, Chun-Ta [3 ]
Hsu, Che-Wei [1 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei City 24205, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung 402, Taiwan
[3] Tainan Univ Technol, Dept Informat Management, Tainan 710, Taiwan
关键词
Anonymity; Chaotic maps; Authenticated key exchange; Password-based; Three-party; SERVER PUBLIC-KEYS; CRYPTANALYSIS; AGREEMENT; SECURITY; SYSTEMS; SCHEME;
D O I
10.1007/s11071-013-0772-4
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this paper, we propose a scheme utilizing three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps, which is more efficient and secure than previously proposed schemes. In order to enhance the efficiency and security, we use the extended chaotic maps to encrypt and decrypt the information transmitted by the user or the server. In addition, the proposed protocol provides user anonymity to guarantee the identity of users, which is transmitted in the insecure public network.
引用
收藏
页码:125 / 132
页数:8
相关论文
共 50 条
  • [1] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Cheng-Chi Lee
    Chun-Ta Li
    Che-Wei Hsu
    Nonlinear Dynamics, 2013, 73 : 125 - 132
  • [2] A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Chen, Chien-Ming
    SOFT COMPUTING, 2018, 22 (08) : 2495 - 2506
  • [3] Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    Kumari, Saru
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [4] Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol
    Wu, Shuhua
    Chen, Kefei
    Zhu, Yuefei
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (03) : 215 - 221
  • [5] Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
    Islam, S. K. Hafizul
    INFORMATION SCIENCES, 2015, 312 : 104 - 130
  • [6] Re-attack on a three-party password-based authenticated key exchange protocol
    Liang, Haiquan
    Hu, Jingtai
    Wu, Shuhua
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (5-6) : 1175 - 1183
  • [7] A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    INFORMATION TECHNOLOGY AND CONTROL, 2015, 44 (04): : 404 - 409
  • [8] An efficient three-party password-based key agreement protocol using extended chaotic maps
    Shu Jian
    CHINESE PHYSICS B, 2015, 24 (06)
  • [9] Strongly password-based three-party authenticated key exchange protocol
    Lin, Yuanhui
    Hou, Mengbo
    Xu, Qiuliang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 555 - 558
  • [10] An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity
    Lu, Yanrong
    Li, Lixiang
    Zhang, Hao
    Yang, Yixian
    PLOS ONE, 2016, 11 (04):