A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps

被引:61
|
作者
Lee, Cheng-Chi [1 ,2 ]
Li, Chun-Ta [3 ]
Hsu, Che-Wei [1 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei City 24205, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung 402, Taiwan
[3] Tainan Univ Technol, Dept Informat Management, Tainan 710, Taiwan
关键词
Anonymity; Chaotic maps; Authenticated key exchange; Password-based; Three-party; SERVER PUBLIC-KEYS; CRYPTANALYSIS; AGREEMENT; SECURITY; SYSTEMS; SCHEME;
D O I
10.1007/s11071-013-0772-4
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this paper, we propose a scheme utilizing three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps, which is more efficient and secure than previously proposed schemes. In order to enhance the efficiency and security, we use the extended chaotic maps to encrypt and decrypt the information transmitted by the user or the server. In addition, the proposed protocol provides user anonymity to guarantee the identity of users, which is transmitted in the insecure public network.
引用
收藏
页码:125 / 132
页数:8
相关论文
共 50 条
  • [41] Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification
    Xie, Qi
    Dong, Na
    Tan, Xiao
    Wong, Duncan S.
    Wang, Guilin
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (03): : 231 - 237
  • [42] TAKAP: A Lightweight Three-Party Authenticated Key Agreement Protocol with User Anonymity
    QIAO Hui
    DONG Xuewen
    SHEN Yulong
    LIU Haozhe
    YANG Lingxiao
    ChineseJournalofElectronics, 2021, 30 (04) : 686 - 696
  • [43] Anonymity preserving and round effective three-party authentication key exchange protocol based on chaotic maps
    Pak, Kyongsok
    Pak, Songho
    Ho, Cholman
    Pak, Myongsuk
    Hwang, Choljin
    PLOS ONE, 2019, 14 (03):
  • [44] Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol
    Tu, Hang
    Shen, Han
    He, Debiao
    Chen, Jianhua
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (01): : 57 - 63
  • [45] Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords
    Xie Qi
    Hu Bin
    Chen Ke-Fei
    Liu Wen-Hao
    Tan Xiao
    CHINESE PHYSICS B, 2015, 24 (11)
  • [46] How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols
    Wang, Weijia
    Hu, Lei
    Li, Yong
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 218 - +
  • [48] Cryptanalysis of an efficient three-party password-based key exchange scheme
    Simplicio, Marcos A., Jr.
    Sakuragui, Rony R. M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (11) : 1443 - 1449
  • [49] Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme
    Wu, Shuhua
    Chen, Kefei
    Pu, Qiong
    Zhu, Yuefei
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (05) : 674 - 686
  • [50] Efficient three-party password-based key exchange scheme
    Lou, Der-Chyuan
    Huang, Hui-Feng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) : 504 - 512