Efficient three-party authenticated key agreement protocol based on chaotic map
Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password relate...
Saved in:
Main Authors: | Xiong LI, Fan WU, Jun-guo LIAO, Yu-zhen LIU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-06-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00060 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Two-factor authenticated key agreement protocol based on biometric feature and password
by: Xiao-wei LI, et al.
Published: (2017-07-01) -
Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles
by: Haibo ZHANG, et al.
Published: (2023-06-01) -
Three-party password authenticated key agreement protocol with user anonymity based on lattice
by: Caifen WANG, et al.
Published: (2018-02-01) -
Verifier-based password-authenticated key exchange protocol for three-party
by: LI Wen-min, et al.
Published: (2008-01-01) -
Password-based three-party authenticated key exchange protocol from lattices
by: Jinxia YU, et al.
Published: (2018-11-01)