Security and efficiency enhancement of an anonymous three-party password- authenticated key agreement using extended chaotic maps

被引:6
|
作者
Xie, Qi [1 ]
Lu, Yanrong [2 ]
Tan, Xiao [1 ]
Tang, Zhixiong [1 ]
Hu, Bin [1 ]
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog & Network Secur, Hangzhou, Zhejiang, Peoples R China
[2] Tianjin Univ, Sch Comp Sci & Technol, Tianjin Key Lab Adv Networking, Tianjin, Peoples R China
来源
PLOS ONE | 2018年 / 13卷 / 10期
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
EXCHANGE PROTOCOL; CRYPTANALYSIS;
D O I
10.1371/journal.pone.0203984
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Recently, Lu et al. claimed that Xie et al.'s three-party password-authenticated key agreement protocol (3PAKA) using chaotic maps has three security vulnerabilities; in particular, it cannot resist offline password guessing attack, Bergamo et al.'s attack and impersonation attack, and then they proposed an improved protocol. However, we demonstrate that Lu et al.'s attacks on Xie et al.'s scheme are unworkable, and their improved protocol is insecure against stolen-verifier attack and off-line password guessing attack. Furthermore, we propose a novel scheme with enhanced security and efficiency. We use formal verification tool ProVerif, which is based on pi calculus, to prove security and authentication of our scheme. The efficiency of the proposed scheme is higher than other related schemes.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity
    Lu, Yanrong
    Li, Lixiang
    Zhang, Hao
    Yang, Yixian
    PLOS ONE, 2016, 11 (04):
  • [2] Chaotic maps-based three-party password-authenticated key agreement scheme
    Xie, Qi
    Zhao, Jianmin
    Yu, Xiuyuan
    NONLINEAR DYNAMICS, 2013, 74 (04) : 1021 - 1027
  • [3] Chaotic maps-based three-party password-authenticated key agreement scheme
    Qi Xie
    Jianmin Zhao
    Xiuyuan Yu
    Nonlinear Dynamics, 2013, 74 : 1021 - 1027
  • [4] An efficient three-party password-based key agreement protocol using extended chaotic maps
    舒剑
    Chinese Physics B, 2015, 24 (06) : 235 - 242
  • [5] An efficient three-party password-based key agreement protocol using extended chaotic maps
    Shu Jian
    CHINESE PHYSICS B, 2015, 24 (06)
  • [6] Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
    Hu, Xuexian
    Zhang, Zhenfeng
    NONLINEAR DYNAMICS, 2014, 78 (02) : 1293 - 1300
  • [7] Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
    Xuexian Hu
    Zhenfeng Zhang
    Nonlinear Dynamics, 2014, 78 : 1293 - 1300
  • [8] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Lee, Cheng-Chi
    Li, Chun-Ta
    Hsu, Che-Wei
    NONLINEAR DYNAMICS, 2013, 73 (1-2) : 125 - 132
  • [9] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Cheng-Chi Lee
    Chun-Ta Li
    Che-Wei Hsu
    Nonlinear Dynamics, 2013, 73 : 125 - 132
  • [10] Improvement on the password authenticated three-party key agreement protocol
    Department of Security Technology and Management, Wufeng University, Chiayi 62153, Taiwan
    不详
    不详
    J. Comput. Inf. Syst., 1 (42-48): : 42 - 48