A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps

被引:61
|
作者
Lee, Cheng-Chi [1 ,2 ]
Li, Chun-Ta [3 ]
Hsu, Che-Wei [1 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei City 24205, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung 402, Taiwan
[3] Tainan Univ Technol, Dept Informat Management, Tainan 710, Taiwan
关键词
Anonymity; Chaotic maps; Authenticated key exchange; Password-based; Three-party; SERVER PUBLIC-KEYS; CRYPTANALYSIS; AGREEMENT; SECURITY; SYSTEMS; SCHEME;
D O I
10.1007/s11071-013-0772-4
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this paper, we propose a scheme utilizing three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps, which is more efficient and secure than previously proposed schemes. In order to enhance the efficiency and security, we use the extended chaotic maps to encrypt and decrypt the information transmitted by the user or the server. In addition, the proposed protocol provides user anonymity to guarantee the identity of users, which is transmitted in the insecure public network.
引用
收藏
页码:125 / 132
页数:8
相关论文
共 50 条
  • [21] Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol
    Lee, Youngsook
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 151 - 160
  • [22] Security analysis and enhancement for three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    Zhang, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 273 - 278
  • [23] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chien-Ming Chen
    King-Hang Wang
    Kuo-Hui Yeh
    Bin Xiang
    Tsu-Yang Wu
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 3133 - 3142
  • [24] Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
    Wu, Shuhua
    Pu, Qiong
    Wang, Shengbao
    He, Debiao
    INFORMATION SCIENCES, 2012, 215 : 83 - 96
  • [25] TAKAP: A Lightweight Three-Party Authenticated Key Agreement Protocol with User Anonymity
    QIAO, Hui
    DONG, Xuewen
    SHEN, Yulong
    LIU, Haozhe
    YANG, Lingxiao
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (04) : 686 - 696
  • [26] A simple three-party password-based key exchange protocol
    Huang, Hui-Feng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2009, 22 (07) : 857 - 862
  • [27] Simple three-party password authenticated key exchange protocol
    Lo N.-W.
    Yeh K.-H.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 600 - 603
  • [28] Simple Three-Party Password Authenticated Key Exchange Protocol
    罗乃维
    叶国晖
    JournalofShanghaiJiaotongUniversity(Science), 2011, 16 (05) : 600 - 603
  • [29] Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card
    Xie, Qi
    Hu, Bin
    Wu, Ting
    NONLINEAR DYNAMICS, 2015, 79 (04) : 2345 - 2358
  • [30] Simple password-based three-party authenticated key exchange without server public keys
    Lee, Tian-Fu
    Hwang, Tzonelih
    INFORMATION SCIENCES, 2010, 180 (09) : 1702 - 1714