Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (6): 13-21.doi: 10.11959/j.issn.2096-109x.2016.00060

• academic paper • Previous Articles     Next Articles

Efficient three-party authenticated key agreement protocol based on chaotic map

Xiong LI1(),Fan WU2,Jun-guo LIAO1,Yu-zhen LIU1   

  1. 1 School of Computer Science and Engineering,Hunan University of Science and Technology,Xiangtan 411201,China
    2 Department of Computer Science and Engineering,Xiamen Institute of Technology,Xiamen 361021,China
  • Revised:2016-06-03 Online:2016-06-15 Published:2020-03-26
  • Supported by:
    The National Natural Science Foundation of China(61300220);Scientific Research Foundation of Hu-nan Provincial Education Department(15C0545);University Distinguished Young Research Talent Training Program of Fujian Province;The Education Scientific Research Project for Young Teachers of Fujian(JA14369)

Abstract:

Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly.

Key words: chaotic maps, key agreement, authentication, password

CLC Number: 

No Suggested Reading articles found!