An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol

被引:0
|
作者
Hongfeng Zhu
Yan Zhang
机构
[1] Shenyang Normal University,Software College
来源
关键词
Deniability; Privacy protection; Chaotic maps; Group session key;
D O I
暂无
中图分类号
学科分类号
摘要
More than two participants implement communication over the network at the same time, aiming to establish a common session key, and it is named group session communication. Nowadays, many researchers lay emphasis on achieve a perfect group key agreement protocol in order to resist various attacks and complete mutual authentication for every two-party among them. Actually, investigators have overlooked an important issue called insider attack, which the inner participants could disclose the source of the messages to outsider parties. Therefore, in this paper, we present a novel group key agreement protocol with deniable authentication to against insider attack. After achieve the process of deniable authentication, the group participants unable to reveal the source of the messages to another party because any subgroup participants still can simulate the whole transcript process. Meanwhile, our protocol based on chaotic maps algorithm, which enhance the calculation efficiency and realize the goal of privacy protection successful.
引用
收藏
页码:217 / 229
页数:12
相关论文
共 50 条
  • [41] An authenticated key agreement protocol based on extended chaotic maps
    Jian, Shu
    ACTA PHYSICA SINICA, 2014, 63 (05) : 050507
  • [42] On the security of a novel key agreement protocol based on chaotic maps
    Xiang, Tao
    Wong, Kwok-Wo
    Liao, Xiaofeng
    CHAOS SOLITONS & FRACTALS, 2009, 40 (02) : 672 - 675
  • [43] Deniable group key agreement
    Bohli, Jens-Matthias
    Steinwandt, Rainer
    PROGRESS IN CRYPTOLOGY - VIETCRYPT 2006, 2006, 4341 : 298 - +
  • [44] A new key agreement protocol based on Chebyshev chaotic maps
    Wang, Xingyuan
    Wang, Siwei
    Wang, Zhanjie
    Zhang, Mengcan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5028 - 5035
  • [45] An efficient deniable authentication protocol
    Huang, HF
    Chang, CC
    2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 307 - 310
  • [46] Chaotic maps-based three-party password-authenticated key agreement scheme
    Xie, Qi
    Zhao, Jianmin
    Yu, Xiuyuan
    NONLINEAR DYNAMICS, 2013, 74 (04) : 1021 - 1027
  • [47] Improved chaotic maps-based password-authenticated key agreement using smart cards
    Lin, Han-Yu
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 20 (02) : 482 - 488
  • [48] A Deniable Authenticated Key Agreement Protocol
    TIAN Haibo1
    2. Guangdong Key Laboratory of Information Security Technology
    WuhanUniversityJournalofNaturalSciences, 2008, (06) : 645 - 650
  • [49] Chaotic maps-based three-party password-authenticated key agreement scheme
    Qi Xie
    Jianmin Zhao
    Xiuyuan Yu
    Nonlinear Dynamics, 2013, 74 : 1021 - 1027
  • [50] Comments on Chaotic Maps-based Password-authenticated Key Agreement Using Smart Cards
    Chang, Ya-Fen
    Tai, Wei-Liang
    Wu, Wei-Na
    Li, Wei-Han
    Chen, Yung-Chi
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 94 - 97