An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
From MaRDI portal
Publication:2345747
DOI10.1007/S11071-014-1304-6zbMath1314.94067OpenAlexW2020237187WikidataQ114689443 ScholiaQ114689443MaRDI QIDQ2345747
Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari
Publication date: 20 May 2015
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-014-1304-6
cryptographyprovable securityChebyshev chaotic mapskey exchange protocolpassword-based authentication
Related Items (10)
Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card ⋮ Provably secure extended chaotic map-based three-party key agreement protocols using password authentication ⋮ GPUs and chaos: a new true random number generator ⋮ Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy ⋮ Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card ⋮ A new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps ⋮ A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps ⋮ Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol ⋮ Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table
Uses Software
Cites Work
- Unnamed Item
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- Chaotic maps-based password-authenticated key agreement using smart cards
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
- Vulnerability of two multiple-key agreement protocols
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
- An extended chaotic maps-based key agreement protocol with user anonymity
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- Chaotic maps-based three-party password-authenticated key agreement scheme
- Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
- Financial Cryptography and Data Security
This page was built for publication: An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps