Efficient three-party authenticated key agreement protocol based on chaotic map
Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password relate...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-06-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00060 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530391353098240 |
---|---|
author | Xiong LI Fan WU Jun-guo LIAO Yu-zhen LIU |
author_facet | Xiong LI Fan WU Jun-guo LIAO Yu-zhen LIU |
author_sort | Xiong LI |
collection | DOAJ |
description | Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly. |
format | Article |
id | doaj-art-a2cc43e64cdb485b9d8ef8a4dc908dce |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2016-06-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-a2cc43e64cdb485b9d8ef8a4dc908dce2025-01-15T03:04:37ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-06-012132159545854Efficient three-party authenticated key agreement protocol based on chaotic mapXiong LIFan WUJun-guo LIAOYu-zhen LIUChaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00060chaotic mapskey agreementauthenticationpassword |
spellingShingle | Xiong LI Fan WU Jun-guo LIAO Yu-zhen LIU Efficient three-party authenticated key agreement protocol based on chaotic map 网络与信息安全学报 chaotic maps key agreement authentication password |
title | Efficient three-party authenticated key agreement protocol based on chaotic map |
title_full | Efficient three-party authenticated key agreement protocol based on chaotic map |
title_fullStr | Efficient three-party authenticated key agreement protocol based on chaotic map |
title_full_unstemmed | Efficient three-party authenticated key agreement protocol based on chaotic map |
title_short | Efficient three-party authenticated key agreement protocol based on chaotic map |
title_sort | efficient three party authenticated key agreement protocol based on chaotic map |
topic | chaotic maps key agreement authentication password |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00060 |
work_keys_str_mv | AT xiongli efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap AT fanwu efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap AT junguoliao efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap AT yuzhenliu efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap |