A chaotic maps-based authenticated key agreement protocol with strong anonymity |
| |
Authors: | Zuowen Tan |
| |
Affiliation: | 1. Department of Computer Science, School of Information Technology, Jiangxi University of Finance and Economics, Nanchang, 330032, China 2. Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes, Guangzhou University, Guangzhou, 510006, China
|
| |
Abstract: | ![]() In wireless communication environments, the authenticated key agreement with user anonymity is important. Recently, many chaotic maps-based anonymous authenticated key agreement protocols have been proposed. Tseng et al. applied Chebyshev chaotic maps to propose an anonymous key agreement protocol. Unfortunately, Niu et al. demonstrated that Tseng et al.’s protocol cannot protect the user anonymity and it suffers from insider attacks. Xue et al. improved Tseng et al.’s protocol. However, we have found that their improved protocol still cannot provide strong anonymity and it is vulnerable to the man-in-the-middle attack. To remove these weaknesses, we have proposed a novel chaotic maps-based authenticated key agreement protocol. The proposed protocol cannot only resist these attacks, but also provide strong anonymity. |
| |
Keywords: | |
本文献已被 SpringerLink 等数据库收录! |
|