2012
DOI: 10.1007/s11071-012-0628-3
|View full text |Cite
|
Sign up to set email alerts
|

A secure chaotic maps-based key agreement protocol without using smart cards

Abstract: To guarantee secure communication, many maps-based key agreement protocols have been proposed. Due to inherent tamper-resistance, most of them are based on smart cards. Unfortunately, the cost of cards and readers makes these protocols costly. In the real world, common storage devices, such as universal serial bus (USB) thumb drives, portable HDDs, mobile phones, and laptop or desktop PCs, are widely used, and they are much cheaper or more convenient for storing user authentication information. These devices d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
27
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(27 citation statements)
references
References 31 publications
0
27
0
Order By: Relevance
“…1. The flowchart of our proposed protocol candidate in the field of cryptography [4], [9]. Recently, the chaos-based three-party authenticated key exchange protocol has been studied widely [3], [10], [12], [13], [14], [15].…”
Section: A Previous and Related Work Regarding 3pake Protocolmentioning
confidence: 99%
“…1. The flowchart of our proposed protocol candidate in the field of cryptography [4], [9]. Recently, the chaos-based three-party authenticated key exchange protocol has been studied widely [3], [10], [12], [13], [14], [15].…”
Section: A Previous and Related Work Regarding 3pake Protocolmentioning
confidence: 99%
“…To design a secure authentication scheme, some cryptographic algorithms are also used, such as an RSA cryptosystem [14,15], elliptic curve cryptography [16,17], hash function [18,19], and chaos-based cryptography [20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…Guo and Zhang also proposed a new chaotic map-based two-party key agreement protocol without using smart cards. In 2013, the security weakness in the protocol of Guo and Zhang was demonstrated by He and Khan [24], and the improved protocols were proposed by [25] and [26]. Besides, Niu and Wang [27] in 2011 developed a three-party authenticated key agreement protocol using chaotic maps to address the weaknesses of the chaotic map-based protocol developed by Tseng et al [28].…”
Section: Introductionmentioning
confidence: 99%