An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol

被引:0
作者
Hongfeng Zhu
Yan Zhang
机构
[1] Shenyang Normal University,Software College
来源
Wireless Personal Communications | 2017年 / 96卷
关键词
Deniability; Privacy protection; Chaotic maps; Group session key;
D O I
暂无
中图分类号
学科分类号
摘要
More than two participants implement communication over the network at the same time, aiming to establish a common session key, and it is named group session communication. Nowadays, many researchers lay emphasis on achieve a perfect group key agreement protocol in order to resist various attacks and complete mutual authentication for every two-party among them. Actually, investigators have overlooked an important issue called insider attack, which the inner participants could disclose the source of the messages to outsider parties. Therefore, in this paper, we present a novel group key agreement protocol with deniable authentication to against insider attack. After achieve the process of deniable authentication, the group participants unable to reveal the source of the messages to another party because any subgroup participants still can simulate the whole transcript process. Meanwhile, our protocol based on chaotic maps algorithm, which enhance the calculation efficiency and realize the goal of privacy protection successful.
引用
收藏
页码:217 / 229
页数:12
相关论文
共 52 条
[1]  
Bresson E(2002)Group Diffie–Hellman key exchange secure against dictionary attacks Advances in Cryptology 2501 497-514
[2]  
Chevassut O(2006)Identity based group key agreement from bilinear pairing WuHan University Journal of Natural Sciences 11 1731-1735
[3]  
Pointcheval D(2010)Secure group key agreement protocol based on chaotic Hash Information Sciences 180 4069-4074
[4]  
Wang LM(2015)A strongly secure identity-based authenticated group key exchange protocol Science China Information Sciences 58 1-12
[5]  
Wu CK(2008)Security of a key agreement protocol based on chaotic maps Chaos, Solitons and Fractals 38 764-768
[6]  
Guo X(2012)An extended chaotic maps-based key agreement protocol with user anonymity Nonlinear Dynamics 69 79-87
[7]  
Zhang J(2013)Chaotic maps-based three-party password-authenticated key agreement scheme Nonlinear Dynamics 74 1021-1027
[8]  
Teng JK(2015)Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards Nonlinear Dynamics 79 809-821
[9]  
Wu CK(2001)Deniable authentication protocols IEE Proceedings on Computers and Digital Techniques 148 101-104
[10]  
Tian YL(2002)Deniable authentication protocol based on Diffie-Hellman algorithm Electronics Letters. 38 705-706