Efficient three-party authenticated key agreement protocol based on chaotic map
Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password relate...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2016-06-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00060 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850073084852174848 |
|---|---|
| author | Xiong LI Fan WU Jun-guo LIAO Yu-zhen LIU |
| author_facet | Xiong LI Fan WU Jun-guo LIAO Yu-zhen LIU |
| author_sort | Xiong LI |
| collection | DOAJ |
| description | Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly. |
| format | Article |
| id | doaj-art-a2cc43e64cdb485b9d8ef8a4dc908dce |
| institution | DOAJ |
| issn | 2096-109X |
| language | English |
| publishDate | 2016-06-01 |
| publisher | POSTS&TELECOM PRESS Co., LTD |
| record_format | Article |
| series | 网络与信息安全学报 |
| spelling | doaj-art-a2cc43e64cdb485b9d8ef8a4dc908dce2025-08-20T02:46:56ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-06-012132159545854Efficient three-party authenticated key agreement protocol based on chaotic mapXiong LIFan WUJun-guo LIAOYu-zhen LIUChaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00060chaotic mapskey agreementauthenticationpassword |
| spellingShingle | Xiong LI Fan WU Jun-guo LIAO Yu-zhen LIU Efficient three-party authenticated key agreement protocol based on chaotic map 网络与信息安全学报 chaotic maps key agreement authentication password |
| title | Efficient three-party authenticated key agreement protocol based on chaotic map |
| title_full | Efficient three-party authenticated key agreement protocol based on chaotic map |
| title_fullStr | Efficient three-party authenticated key agreement protocol based on chaotic map |
| title_full_unstemmed | Efficient three-party authenticated key agreement protocol based on chaotic map |
| title_short | Efficient three-party authenticated key agreement protocol based on chaotic map |
| title_sort | efficient three party authenticated key agreement protocol based on chaotic map |
| topic | chaotic maps key agreement authentication password |
| url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00060 |
| work_keys_str_mv | AT xiongli efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap AT fanwu efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap AT junguoliao efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap AT yuzhenliu efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap |