An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol

被引:0
|
作者
Hongfeng Zhu
Yan Zhang
机构
[1] Shenyang Normal University,Software College
来源
关键词
Deniability; Privacy protection; Chaotic maps; Group session key;
D O I
暂无
中图分类号
学科分类号
摘要
More than two participants implement communication over the network at the same time, aiming to establish a common session key, and it is named group session communication. Nowadays, many researchers lay emphasis on achieve a perfect group key agreement protocol in order to resist various attacks and complete mutual authentication for every two-party among them. Actually, investigators have overlooked an important issue called insider attack, which the inner participants could disclose the source of the messages to outsider parties. Therefore, in this paper, we present a novel group key agreement protocol with deniable authentication to against insider attack. After achieve the process of deniable authentication, the group participants unable to reveal the source of the messages to another party because any subgroup participants still can simulate the whole transcript process. Meanwhile, our protocol based on chaotic maps algorithm, which enhance the calculation efficiency and realize the goal of privacy protection successful.
引用
收藏
页码:217 / 229
页数:12
相关论文
共 50 条
  • [31] A novel key agreement protocol based on chaotic maps
    Xiao, Di
    Liao, Xiaofeng
    Deng, Shaojiang
    INFORMATION SCIENCES, 2007, 177 (04) : 1136 - 1142
  • [32] A new key agreement protocol based on chaotic maps
    Yoon, Eun-Jun
    Yoo, Kee-Young
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2008, 4953 : 897 - +
  • [33] A secure key agreement protocol based on chaotic maps
    王兴元
    栾大朋
    Chinese Physics B, 2013, 22 (11) : 243 - 247
  • [34] A revised key agreement protocol based on chaotic maps
    Abdollah Jabbari
    Jamshid Bagherzadeh
    Nonlinear Dynamics, 2014, 78 : 669 - 680
  • [35] Sustainable Authentication and Key Agreement Protocol Using Chaotic Maps for Industry 5.0
    Zhang, Tao
    Shen, Jian
    Yang, Huijie
    Vijayakumar, Pandi
    Gupta, Brij B.
    Arya, Varsha
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 1580 - 1589
  • [36] Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments
    Tsai, Jia-Lun
    Lo, Nai-Wei
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (11) : 1971 - 1978
  • [37] A secure non-interactive chaotic maps-based deniable authentication scheme with privacy protection in standard model
    Zhu H.
    Zhang Y.
    Journal of Computers (Taiwan), 2018, 29 (03) : 109 - 120
  • [38] A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme
    Han, Lidong
    Xie, Qi
    Liu, Wenhao
    Wang, Shengbao
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 3391 - 3406
  • [39] A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme
    Lidong Han
    Qi Xie
    Wenhao Liu
    Shengbao Wang
    Wireless Personal Communications, 2017, 95 : 3391 - 3406
  • [40] Chaotic maps-based password-authenticated key agreement using smart cards
    Guo, Cheng
    Chang, Chin-Chen
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (06) : 1433 - 1440