Efficient three-party authenticated key agreement protocol based on chaotic map

Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password relate...

Full description

Saved in:
Bibliographic Details
Main Authors: Xiong LI, Fan WU, Jun-guo LIAO, Yu-zhen LIU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2016-06-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00060
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530391353098240
author Xiong LI
Fan WU
Jun-guo LIAO
Yu-zhen LIU
author_facet Xiong LI
Fan WU
Jun-guo LIAO
Yu-zhen LIU
author_sort Xiong LI
collection DOAJ
description Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly.
format Article
id doaj-art-a2cc43e64cdb485b9d8ef8a4dc908dce
institution Kabale University
issn 2096-109X
language English
publishDate 2016-06-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-a2cc43e64cdb485b9d8ef8a4dc908dce2025-01-15T03:04:37ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-06-012132159545854Efficient three-party authenticated key agreement protocol based on chaotic mapXiong LIFan WUJun-guo LIAOYu-zhen LIUChaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00060chaotic mapskey agreementauthenticationpassword
spellingShingle Xiong LI
Fan WU
Jun-guo LIAO
Yu-zhen LIU
Efficient three-party authenticated key agreement protocol based on chaotic map
网络与信息安全学报
chaotic maps
key agreement
authentication
password
title Efficient three-party authenticated key agreement protocol based on chaotic map
title_full Efficient three-party authenticated key agreement protocol based on chaotic map
title_fullStr Efficient three-party authenticated key agreement protocol based on chaotic map
title_full_unstemmed Efficient three-party authenticated key agreement protocol based on chaotic map
title_short Efficient three-party authenticated key agreement protocol based on chaotic map
title_sort efficient three party authenticated key agreement protocol based on chaotic map
topic chaotic maps
key agreement
authentication
password
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00060
work_keys_str_mv AT xiongli efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap
AT fanwu efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap
AT junguoliao efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap
AT yuzhenliu efficientthreepartyauthenticatedkeyagreementprotocolbasedonchaoticmap