2015
DOI: 10.1007/s11071-015-2135-9
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure extended chaotic map-based three-party key agreement protocols using password authentication

Abstract: This paper presents a novel three-party key agreement protocol using password authentication, which enables each client sharing a long-lived secret only with a trusted server to exchange confidential and authenticated information with another client over an insecure network via the server. The proposed protocol is based on extended chaotic maps and adopts the technique that the clients can publicly exchange the factors for generating the session key without the help of the server such that the numbers of trans… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(15 citation statements)
references
References 31 publications
(53 reference statements)
0
15
0
Order By: Relevance
“…In an authenticated key agreement protocol, if the session key is based on asymmetric cryptosystems, such as the Diffie-Hellman key exchange or the Elliptic Curve (ECC) Diffie-Hellman key exchange [1, 33, 34], Chebyshev chaotic map-based Diffie-Hellman key exchange [15, 35, 36, 37] then revealing the sub-keys used to generate the session key cannot compromise the session key. This subsection will use the Diffie-Hellman key exchange to propose communication-efficient 3AKA-MA protocols in which revealing the sub-keys cannot compromise the session key.…”
Section: The Communication-efficient 3aka-ma Protocolsmentioning
confidence: 99%
See 3 more Smart Citations
“…In an authenticated key agreement protocol, if the session key is based on asymmetric cryptosystems, such as the Diffie-Hellman key exchange or the Elliptic Curve (ECC) Diffie-Hellman key exchange [1, 33, 34], Chebyshev chaotic map-based Diffie-Hellman key exchange [15, 35, 36, 37] then revealing the sub-keys used to generate the session key cannot compromise the session key. This subsection will use the Diffie-Hellman key exchange to propose communication-efficient 3AKA-MA protocols in which revealing the sub-keys cannot compromise the session key.…”
Section: The Communication-efficient 3aka-ma Protocolsmentioning
confidence: 99%
“…When sends oracle a message M , sends back the response message that is computed by executing P . can send a user oracle a query as initialization of executing P [35]. …”
Section: Security and Performance Analysesmentioning
confidence: 99%
See 2 more Smart Citations
“…With the rapid development of network technology and multimedia technology, multimedia messaging has become an important means of access to information, it has become an important part of people's lives: the digital information in various forms of portable rapid transmission on the network, e-commerce, e-government through the network it provides a variety of services for us, but at the same time also brought the issue of information security risks [1]. According to statistics, almost every 20 seconds around the world together hacker intrusion incident, According to FBI investigation, only the US annual economic loss due to information security problems caused by it more than 17 billion US dollars [2].…”
Section: Introductionmentioning
confidence: 99%