A Secure Three-party Authenticated Key Exchange Protocol Based on Extended Chaotic Maps in Cloud Storage Service

被引:0
作者
Li, Chun-Ta [1 ]
Lee, Chin-Wen [2 ]
Shen, Jau-Ji [2 ]
机构
[1] Tainan Univ Technol, Dept Informat Management, 529 Zhongzheng Rd, Tainan 71002, Taiwan
[2] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 40227, Taiwan
来源
2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN) | 2015年
关键词
Three-party authenticated key exchange; Network security; Session key; Cloud storage service; Extended chaotic maps; CHEBYSHEV POLYNOMIALS; AGREEMENT PROTOCOL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In order to guarantee secure communications in cloud storage service, we integrated the concept of session key establishment and extended chaotic maps into our proposed method which aims to allow data senders and data receivers to establish a secure common session key through a trusted cloud server over an insecure channel when they wish to share the sensitive data in cloud storage service. Moreover, due to the characteristics of extended chaotic maps and session key establishment, the agreed session key is only known by the communication participants. Therefore, we propose a secure three-party authenticated key exchange protocol (3PAKE) based on extended chaotic maps in cloud storage service without using smart card and timestamp, which requires neither long-term secret keys nor symmetric cryptosystems. According to our security analysis, our proposed protocol not only can achieve many general requirements that 3PAKE protocols should fulfill but also can against various known attacks. In this paper, comparing with other 3PAKE protocols, our proposed protocol is more secure and practical for real environments.
引用
收藏
页码:31 / 36
页数:6
相关论文
共 15 条
  • [1] Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport
    Baliga, Jayant
    Ayre, Robert W. A.
    Hinton, Kerry
    Tucker, Rodney S.
    [J]. PROCEEDINGS OF THE IEEE, 2011, 99 (01) : 149 - 167
  • [2] Security of public-key cryptosystems based on Chebyshev polynomials
    Bergamo, P
    D'Arco, P
    De Santis, A
    Kocarev, L
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) : 1382 - 1393
  • [3] An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    [J]. NONLINEAR DYNAMICS, 2014, 77 (1-2) : 399 - 411
  • [4] A secure chaotic maps-based key agreement protocol without using smart cards
    Gong, Peng
    Li, Ping
    Shi, Wenbo
    [J]. NONLINEAR DYNAMICS, 2012, 70 (04) : 2401 - 2406
  • [5] Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
    He, Debiao
    Chen, Yitao
    Chen, Jianhua
    [J]. NONLINEAR DYNAMICS, 2012, 69 (03) : 1149 - 1157
  • [6] Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol
    Lai, Hong
    Xiao, Jinghua
    Li, Lixiang
    Yang, Yixian
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2012, 2012
  • [7] Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing
    Iosup, Alexandru
    Ostermann, Simon
    Yigitbasi, M. Nezih
    Prodan, Radu
    Fahringer, Thomas
    Epema, Dick H. J.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (06) : 931 - 945
  • [8] Lee C-C, 2013, INT J NETW SECUR, V15, P231
  • [9] Li C. T., 2013, LECT NOTES COMPUTER, V8662, P367
  • [10] An novel three-party authenticated key exchange protocol using one-time key
    Lv, Chao
    Ma, Maode
    Li, Hui
    Ma, Jianfeng
    Zhang, Yaoyu
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 498 - 503