A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps

被引:61
|
作者
Lee, Cheng-Chi [1 ,2 ]
Li, Chun-Ta [3 ]
Hsu, Che-Wei [1 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei City 24205, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung 402, Taiwan
[3] Tainan Univ Technol, Dept Informat Management, Tainan 710, Taiwan
关键词
Anonymity; Chaotic maps; Authenticated key exchange; Password-based; Three-party; SERVER PUBLIC-KEYS; CRYPTANALYSIS; AGREEMENT; SECURITY; SYSTEMS; SCHEME;
D O I
10.1007/s11071-013-0772-4
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this paper, we propose a scheme utilizing three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps, which is more efficient and secure than previously proposed schemes. In order to enhance the efficiency and security, we use the extended chaotic maps to encrypt and decrypt the information transmitted by the user or the server. In addition, the proposed protocol provides user anonymity to guarantee the identity of users, which is transmitted in the insecure public network.
引用
收藏
页码:125 / 132
页数:8
相关论文
共 50 条
  • [1] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Cheng-Chi Lee
    Chun-Ta Li
    Che-Wei Hsu
    Nonlinear Dynamics, 2013, 73 : 125 - 132
  • [2] Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    Kumari, Saru
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [3] A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
    Chun-Ta Li
    Chin-Ling Chen
    Cheng-Chi Lee
    Chi-Yao Weng
    Chien-Ming Chen
    Soft Computing, 2018, 22 : 2495 - 2506
  • [4] A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Chen, Chien-Ming
    SOFT COMPUTING, 2018, 22 (08) : 2495 - 2506
  • [5] An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity
    Lu, Yanrong
    Li, Lixiang
    Zhang, Hao
    Yang, Yixian
    PLOS ONE, 2016, 11 (04):
  • [6] Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
    Islam, S. K. Hafizul
    INFORMATION SCIENCES, 2015, 312 : 104 - 130
  • [7] Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol
    Wu, Shuhua
    Chen, Kefei
    Zhu, Yuefei
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (03) : 215 - 221
  • [8] An efficient three-party password-based key agreement protocol using extended chaotic maps
    舒剑
    Chinese Physics B, 2015, (06) : 235 - 242
  • [9] Efficient three-party password-based authenticated key exchange protocol
    Xu, C.-X., 1600, Univ. of Electronic Science and Technology of China (41):
  • [10] An efficient three-party password-based key agreement protocol using extended chaotic maps
    Shu Jian
    CHINESE PHYSICS B, 2015, 24 (06)