A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps

被引:61
|
作者
Lee, Cheng-Chi [1 ,2 ]
Li, Chun-Ta [3 ]
Hsu, Che-Wei [1 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei City 24205, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung 402, Taiwan
[3] Tainan Univ Technol, Dept Informat Management, Tainan 710, Taiwan
关键词
Anonymity; Chaotic maps; Authenticated key exchange; Password-based; Three-party; SERVER PUBLIC-KEYS; CRYPTANALYSIS; AGREEMENT; SECURITY; SYSTEMS; SCHEME;
D O I
10.1007/s11071-013-0772-4
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this paper, we propose a scheme utilizing three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps, which is more efficient and secure than previously proposed schemes. In order to enhance the efficiency and security, we use the extended chaotic maps to encrypt and decrypt the information transmitted by the user or the server. In addition, the proposed protocol provides user anonymity to guarantee the identity of users, which is transmitted in the insecure public network.
引用
收藏
页码:125 / 132
页数:8
相关论文
共 50 条
  • [31] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chen, Chien-Ming
    Wang, King-Hang
    Yeh, Kuo-Hui
    Xiang, Bin
    Wu, Tsu-Yang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) : 3133 - 3142
  • [32] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chien-Ming Chen
    King-Hang Wang
    Kuo-Hui Yeh
    Bin Xiang
    Tsu-Yang Wu
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 3133 - 3142
  • [33] Cryptanalysis of a simple three-party password-based key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) : 532 - 542
  • [34] Hybrid Protocol for Password-based Key Exchange in Three-party Setting
    He Xinzheng
    Ru Bei
    Fei Jinlong
    Xun Baocheng
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 119 - +
  • [35] Enhanced password-based simple three-party key exchange protocol
    Kim, Hyun-Seok
    Choi, Jin-Young
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 107 - 114
  • [36] Simple three-party password authenticated key exchange protocol
    Lo N.-W.
    Yeh K.-H.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 600 - 603
  • [37] Simple Three-Party Password Authenticated Key Exchange Protocol
    罗乃维
    叶国晖
    JournalofShanghaiJiaotongUniversity(Science), 2011, 16 (05) : 600 - 603
  • [38] An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks
    Hang Tu
    Neeraj Kumar
    Debiao He
    Jongsung Kim
    Changhoon Lee
    The Journal of Supercomputing, 2014, 70 : 224 - 235
  • [39] An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks
    Tu, Hang
    Kumar, Neeraj
    He, Debiao
    Kim, Jongsung
    Lee, Changhoon
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (01): : 224 - 235
  • [40] A Secure Three-party Authenticated Key Exchange Protocol Based on Extended Chaotic Maps in Cloud Storage Service
    Li, Chun-Ta
    Lee, Chin-Wen
    Shen, Jau-Ji
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 31 - 36