Journal
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION
Volume 17, Issue 7, Pages 2969-2977Publisher
ELSEVIER
DOI: 10.1016/j.cnsns.2011.11.025
Keywords
Key agreement; Chaotic maps; User anonymity; Contributory property; Protocol security
Categories
Funding
- National Natural Science Foundation of China [60903216]
- National High-Tech Key Program of China [2009AA012002]
- National S& T Major Project of China [2010ZX03003-002, 2011ZX03005-006]
Ask authors/readers for more resources
In 2009, Tseng et al. proposed a password sharing and chaotic map based key agreement protocol (Tseng et al.'s protocol). They claimed that the protocol provided mutual authentication between a server and a user, and allowed the user to anonymously interact with the server to establish a shared session key. However, in 2011, Niu et al. have proved that Tseng et al.'s protocol cannot guarantee user anonymity and protocol security when there is an internal adversary who is a legitimate user. Also it cannot provide perfect forward secrecy. Then Niu et al. introduced a trust third party (UP) into their protocol designing (Niu et al.'s protocol). But according to our research, Niu et al.'s protocol is found to have several unsatisfactory drawbacks. Based on reconsidering Tseng et al.'s protocol without introducing UP, we give some improvements to meet the original security and performance requirements. Meanwhile our proposed protocol overcomes the security flaws of Tseng et al.'s protocol. (C) 2011 Elsevier B.V. All rights reserved.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available