A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps

被引:61
|
作者
Lee, Cheng-Chi [1 ,2 ]
Li, Chun-Ta [3 ]
Hsu, Che-Wei [1 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei City 24205, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung 402, Taiwan
[3] Tainan Univ Technol, Dept Informat Management, Tainan 710, Taiwan
关键词
Anonymity; Chaotic maps; Authenticated key exchange; Password-based; Three-party; SERVER PUBLIC-KEYS; CRYPTANALYSIS; AGREEMENT; SECURITY; SYSTEMS; SCHEME;
D O I
10.1007/s11071-013-0772-4
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this paper, we propose a scheme utilizing three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps, which is more efficient and secure than previously proposed schemes. In order to enhance the efficiency and security, we use the extended chaotic maps to encrypt and decrypt the information transmitted by the user or the server. In addition, the proposed protocol provides user anonymity to guarantee the identity of users, which is transmitted in the insecure public network.
引用
收藏
页码:125 / 132
页数:8
相关论文
共 50 条
  • [31] Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
    Sahi, Agee
    Lai, David
    Li, Yan
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2018, 21 (04) : 560 - 581
  • [32] Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Kim, Moonseong
    Paik, Juryon
    Won, Dongho
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3244 - 3260
  • [33] Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
    Li, Xiong
    Niu, Jianwei
    Kumari, Saru
    Khan, Muhammad Khurram
    Liao, Junguo
    Liang, Wei
    NONLINEAR DYNAMICS, 2015, 80 (03) : 1209 - 1220
  • [34] Cryptanalysis of a simple three-party password-based key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) : 532 - 542
  • [35] Hybrid Protocol for Password-based Key Exchange in Three-party Setting
    He Xinzheng
    Ru Bei
    Fei Jinlong
    Xun Baocheng
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 119 - +
  • [36] Enhanced password-based simple three-party key exchange protocol
    Kim, Hyun-Seok
    Choi, Jin-Young
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 107 - 114
  • [37] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL
    Lo, Nai Wei
    Yeh, Kuo-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
  • [38] An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks
    Hang Tu
    Neeraj Kumar
    Debiao He
    Jongsung Kim
    Changhoon Lee
    The Journal of Supercomputing, 2014, 70 : 224 - 235
  • [39] Offline dictionary attack on a universally composable three-party password-based key exchange protocol
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    CEIS 2011, 2011, 15
  • [40] Chaotic maps-based three-party password-authenticated key agreement scheme
    Xie, Qi
    Zhao, Jianmin
    Yu, Xiuyuan
    NONLINEAR DYNAMICS, 2013, 74 (04) : 1021 - 1027