Skip to main content

2016 | OriginalPaper | Buchkapitel

An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password

verfasst von : Xiong Li, Junguo Liao, Wei Liang, Jingqiang Zhao

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Chaotic maps have been used in the design of cryptosystem due to its excellent properties. Recently, researchers have proposed many authenticated key agreement protocols based on the chaotic maps. However, most of those protocols use the password to achieve the key agreement, and it will lead some security problems. First, the server has to store a sensitive verification table, and it is dangerous if the server has been compromised or the verification table was stolen. Besides, the low entropy passwords are vulnerable to some password related attacks, such as insider attack and password guessing attack. To resolve the aforementioned problems, this paper propose an extended chaotic maps based authenticated key agreement protocol without using password, where the server just needs to maintain a master secret key and the user just needs to hold a secret key, then they can achieve the key agreement. Compared with other related protocols, the proposed protocol not only keeps the efficiency, but also enhances the security. So, it is more suitable for client/server environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Guo, P., Wang, J., Li, B., Lee, S.Y.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–936 (2014) Guo, P., Wang, J., Li, B., Lee, S.Y.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–936 (2014)
2.
Zurück zum Zitat Shen, J., Tan, H.W., Wang, J., Wang, J.W., Lee, S.Y.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171–178 (2015) Shen, J., Tan, H.W., Wang, J., Wang, J.W., Lee, S.Y.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171–178 (2015)
3.
Zurück zum Zitat Ren, Y.J., Shen, J., Wang, J., Han, J., Lee, S.Y.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015) Ren, Y.J., Shen, J., Wang, J., Han, J., Lee, S.Y.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)
5.
Zurück zum Zitat Xiong, H., Chen, Z., Li, F.: New identity-based three-party authenticated key agreement protocol with provable security. J. Netw. Comput. Appl. 36(2), 927–932 (2013)CrossRef Xiong, H., Chen, Z., Li, F.: New identity-based three-party authenticated key agreement protocol with provable security. J. Netw. Comput. Appl. 36(2), 927–932 (2013)CrossRef
6.
Zurück zum Zitat He, D., Padhye, S., Chen, J.: An efficient certificateless two-party authenticated key agreement protocol. Comput. Math. Appl. 64(6), 1914–1926 (2012)MathSciNetCrossRefMATH He, D., Padhye, S., Chen, J.: An efficient certificateless two-party authenticated key agreement protocol. Comput. Math. Appl. 64(6), 1914–1926 (2012)MathSciNetCrossRefMATH
7.
Zurück zum Zitat Hölbl, M., Welzer, T., Brumen, B.: An improved two-party identity-based authenticated key agreement protocol using pairings. J. Comput. Syst. Sci. 78(1), 142–150 (2012)MathSciNetCrossRefMATH Hölbl, M., Welzer, T., Brumen, B.: An improved two-party identity-based authenticated key agreement protocol using pairings. J. Comput. Syst. Sci. 78(1), 142–150 (2012)MathSciNetCrossRefMATH
8.
Zurück zum Zitat He, D., Chen, J., Hu, J.: An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf. Fusion 13(3), 223–230 (2012)CrossRef He, D., Chen, J., Hu, J.: An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf. Fusion 13(3), 223–230 (2012)CrossRef
9.
Zurück zum Zitat Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136–1142 (2007)MathSciNetCrossRef Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136–1142 (2007)MathSciNetCrossRef
10.
11.
Zurück zum Zitat Xiang, T., Wong, K.W., Liao, X.: On the security of a novel key agreement protocol based on chaotic maps. Chaos, Solitons Fractals 40(2), 672–675 (2009)CrossRefMATH Xiang, T., Wong, K.W., Liao, X.: On the security of a novel key agreement protocol based on chaotic maps. Chaos, Solitons Fractals 40(2), 672–675 (2009)CrossRefMATH
12.
Zurück zum Zitat Xiao, D., Liao, X., Deng, S.: Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178(6), 1598–1602 (2008)MathSciNetCrossRefMATH Xiao, D., Liao, X., Deng, S.: Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178(6), 1598–1602 (2008)MathSciNetCrossRefMATH
13.
Zurück zum Zitat Tseng, H.R., Jan, R.H., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: Proceedings of 2009 IEEE International Conference on Communications (ICC 2009), pp. 1–6. IEEE, June 2009 Tseng, H.R., Jan, R.H., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: Proceedings of 2009 IEEE International Conference on Communications (ICC 2009), pp. 1–6. IEEE, June 2009
14.
Zurück zum Zitat Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986–1992 (2011)MathSciNetCrossRefMATH Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986–1992 (2011)MathSciNetCrossRefMATH
15.
Zurück zum Zitat Yoon, E.J.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2735–2740 (2012)MathSciNetCrossRefMATH Yoon, E.J.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2735–2740 (2012)MathSciNetCrossRefMATH
16.
Zurück zum Zitat Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969–2977 (2012)MathSciNetCrossRefMATH Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969–2977 (2012)MathSciNetCrossRefMATH
17.
Zurück zum Zitat Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)MathSciNetCrossRefMATH Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)MathSciNetCrossRefMATH
18.
Zurück zum Zitat He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)MathSciNetCrossRefMATH He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)MathSciNetCrossRefMATH
19.
20.
Zurück zum Zitat Gong, P., Li, P., Shi, W.: A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dyn. 70(4), 2401–2406 (2012)MathSciNetCrossRef Gong, P., Li, P., Shi, W.: A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dyn. 70(4), 2401–2406 (2012)MathSciNetCrossRef
21.
Zurück zum Zitat Wang, X.Y., Luan, D.P.: A secure key agreement protocol based on chaotic maps. Chin. Phys. B 22(11), 110503 (2013)MathSciNetCrossRef Wang, X.Y., Luan, D.P.: A secure key agreement protocol based on chaotic maps. Chin. Phys. B 22(11), 110503 (2013)MathSciNetCrossRef
22.
Zurück zum Zitat Shu, J.: An authenticated key agreement protocol based on extended chaotic maps. Acta Phys. Sinica 63(5), 050507 (2014) Shu, J.: An authenticated key agreement protocol based on extended chaotic maps. Acta Phys. Sinica 63(5), 050507 (2014)
23.
Zurück zum Zitat Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3), 669–674 (2008)MathSciNetCrossRefMATH Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3), 669–674 (2008)MathSciNetCrossRefMATH
24.
Metadaten
Titel
An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password
verfasst von
Xiong Li
Junguo Liao
Wei Liang
Jingqiang Zhao
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-48671-0_37