An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol

被引:0
作者
Hongfeng Zhu
Yan Zhang
机构
[1] Shenyang Normal University,Software College
来源
Wireless Personal Communications | 2017年 / 96卷
关键词
Deniability; Privacy protection; Chaotic maps; Group session key;
D O I
暂无
中图分类号
学科分类号
摘要
More than two participants implement communication over the network at the same time, aiming to establish a common session key, and it is named group session communication. Nowadays, many researchers lay emphasis on achieve a perfect group key agreement protocol in order to resist various attacks and complete mutual authentication for every two-party among them. Actually, investigators have overlooked an important issue called insider attack, which the inner participants could disclose the source of the messages to outsider parties. Therefore, in this paper, we present a novel group key agreement protocol with deniable authentication to against insider attack. After achieve the process of deniable authentication, the group participants unable to reveal the source of the messages to another party because any subgroup participants still can simulate the whole transcript process. Meanwhile, our protocol based on chaotic maps algorithm, which enhance the calculation efficiency and realize the goal of privacy protection successful.
引用
收藏
页码:217 / 229
页数:12
相关论文
共 50 条
  • [41] Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks
    Xie, Qi
    Hu, Bin
    Tan, Xiao
    Wong, Duncan S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5881 - 5896
  • [42] Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks
    Qi Xie
    Bin Hu
    Xiao Tan
    Duncan S. Wong
    [J]. Wireless Personal Communications, 2017, 96 : 5881 - 5896
  • [43] Chameleon-based deniable authenticated key agreement protocol secure against forgery
    Ma, Chunbo
    Ao, Jun
    Li, Jianhua
    [J]. ONLINE COMMUNITIES AND SOCIAL COMPUTING, PROCEEDINGS, 2007, 4564 : 124 - +
  • [44] A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
    Cheng-Chi Lee
    Che-Wei Hsu
    [J]. Nonlinear Dynamics, 2013, 71 : 201 - 211
  • [45] A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
    Lee, Cheng-Chi
    Hsu, Che-Wei
    [J]. NONLINEAR DYNAMICS, 2013, 71 (1-2) : 201 - 211
  • [46] ID-Based Deniable Authentication Protocol with Key Agreement and Time-Bound Properties for 6G-Based WBAN Healthcare Environments
    Hsu, Chien-Lung
    Nguyen, Anh-Tuan
    Cheng, Guan-Lin
    [J]. ELECTRONICS, 2023, 12 (12)
  • [47] A Deniable Group Key Establishment Protocol in the Standard Model
    Zhang, Yazhe
    Wang, Kunpeng
    Li, Bao
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 308 - 323
  • [48] An Improved User Authentication Protocol Based on Chaotic Maps for Multiserver Environment
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    [J]. ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2021, 24 (01): : 58 - 78
  • [49] An Improved RFID Authentication Protocol with Privacy Protection Based on Chaotic Maps
    Zhu, Hongfeng
    Zhang, Yan
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (06): : 1777 - 1787
  • [50] A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Chen, Song-Jhih
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)