An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol

被引:0
|
作者
Hongfeng Zhu
Yan Zhang
机构
[1] Shenyang Normal University,Software College
来源
关键词
Deniability; Privacy protection; Chaotic maps; Group session key;
D O I
暂无
中图分类号
学科分类号
摘要
More than two participants implement communication over the network at the same time, aiming to establish a common session key, and it is named group session communication. Nowadays, many researchers lay emphasis on achieve a perfect group key agreement protocol in order to resist various attacks and complete mutual authentication for every two-party among them. Actually, investigators have overlooked an important issue called insider attack, which the inner participants could disclose the source of the messages to outsider parties. Therefore, in this paper, we present a novel group key agreement protocol with deniable authentication to against insider attack. After achieve the process of deniable authentication, the group participants unable to reveal the source of the messages to another party because any subgroup participants still can simulate the whole transcript process. Meanwhile, our protocol based on chaotic maps algorithm, which enhance the calculation efficiency and realize the goal of privacy protection successful.
引用
收藏
页码:217 / 229
页数:12
相关论文
共 50 条
  • [21] Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
    Xiong Li
    Jianwei Niu
    Saru Kumari
    Muhammad Khurram Khan
    Junguo Liao
    Wei Liang
    Nonlinear Dynamics, 2015, 80 : 1209 - 1220
  • [22] Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1321 - 1330
  • [23] Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
    Xiao, Di
    Liao, Xiaofeng
    Deng, Shaojiang
    INFORMATION SCIENCES, 2008, 178 (06) : 1598 - 1602
  • [24] Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
    Li, Xiong
    Niu, Jianwei
    Kumari, Saru
    Khan, Muhammad Khurram
    Liao, Junguo
    Liang, Wei
    NONLINEAR DYNAMICS, 2015, 80 (03) : 1209 - 1220
  • [25] Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks
    Shakiba, A.
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2019, 40 (03): : 725 - 750
  • [26] A revised key agreement protocol based on chaotic maps
    Jabbari, Abdollah
    Bagherzadeh, Jamshid
    NONLINEAR DYNAMICS, 2014, 78 (01) : 669 - 680
  • [27] A secure key agreement protocol based on chaotic maps
    Wang Xing-Yuan
    Luan Da-Peng
    CHINESE PHYSICS B, 2013, 22 (11)
  • [29] Security of a key agreement protocol based on chaotic maps
    Han, Song
    CHAOS SOLITONS & FRACTALS, 2008, 38 (03) : 764 - 768
  • [30] An anonymous key agreement protocol based on chaotic maps
    Niu, Yujun
    Wang, Xingyuan
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (04) : 1986 - 1992