An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol

被引:0
作者
Hongfeng Zhu
Yan Zhang
机构
[1] Shenyang Normal University,Software College
来源
Wireless Personal Communications | 2017年 / 96卷
关键词
Deniability; Privacy protection; Chaotic maps; Group session key;
D O I
暂无
中图分类号
学科分类号
摘要
More than two participants implement communication over the network at the same time, aiming to establish a common session key, and it is named group session communication. Nowadays, many researchers lay emphasis on achieve a perfect group key agreement protocol in order to resist various attacks and complete mutual authentication for every two-party among them. Actually, investigators have overlooked an important issue called insider attack, which the inner participants could disclose the source of the messages to outsider parties. Therefore, in this paper, we present a novel group key agreement protocol with deniable authentication to against insider attack. After achieve the process of deniable authentication, the group participants unable to reveal the source of the messages to another party because any subgroup participants still can simulate the whole transcript process. Meanwhile, our protocol based on chaotic maps algorithm, which enhance the calculation efficiency and realize the goal of privacy protection successful.
引用
收藏
页码:217 / 229
页数:12
相关论文
共 50 条
  • [31] An extended chaotic-maps-based protocol with key agreement for multiserver environments
    Lee, Cheng-Chi
    Lou, Der-Chyuan
    Li, Chun-Ta
    Hsu, Che-Wei
    NONLINEAR DYNAMICS, 2014, 76 (01) : 853 - 866
  • [32] An extended chaotic-maps-based protocol with key agreement for multiserver environments
    Cheng-Chi Lee
    Der-Chyuan Lou
    Chun-Ta Li
    Che-Wei Hsu
    Nonlinear Dynamics, 2014, 76 : 853 - 866
  • [33] Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2167 - 2170
  • [34] Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
    Xuexian Hu
    Zhenfeng Zhang
    Nonlinear Dynamics, 2014, 78 : 1293 - 1300
  • [35] Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
    Hu, Xuexian
    Zhang, Zhenfeng
    NONLINEAR DYNAMICS, 2014, 78 (02) : 1293 - 1300
  • [36] An Efficient and Secure Key Agreement Protocol Preserving User Anonymity Under Chebyshev Chaotic Maps
    Lai, Hong
    Luo, Mingxing
    Tao, Li
    Xiao, Fuyuan
    Zhan, Cheng
    Hu, Xiaofang
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 479 - 489
  • [37] A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps
    Zhu, Hongfeng
    Hao, Xin
    NONLINEAR DYNAMICS, 2015, 81 (1-2) : 311 - 321
  • [38] A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps
    Hongfeng Zhu
    Xin Hao
    Nonlinear Dynamics, 2015, 81 : 311 - 321
  • [39] An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password
    Li, Xiong
    Liao, Junguo
    Liang, Wei
    Zhao, Jingqiang
    CLOUD COMPUTING AND SECURITY, ICCCS 2016, PT I, 2016, 10039 : 421 - 431
  • [40] Enhancement key agreement scheme based on chaotic maps
    Chain, Kai
    Kuo, Wen-Chung
    Chang, Kuei-Hu
    International Journal of Computers and Applications, 2015, 37 (02) : 67 - 72