4.7 Article

Security improvement on an anonymous key agreement protocol based on chaotic maps

Journal

Publisher

ELSEVIER
DOI: 10.1016/j.cnsns.2011.11.025

Keywords

Key agreement; Chaotic maps; User anonymity; Contributory property; Protocol security

Funding

  1. National Natural Science Foundation of China [60903216]
  2. National High-Tech Key Program of China [2009AA012002]
  3. National S& T Major Project of China [2010ZX03003-002, 2011ZX03005-006]

Ask authors/readers for more resources

In 2009, Tseng et al. proposed a password sharing and chaotic map based key agreement protocol (Tseng et al.'s protocol). They claimed that the protocol provided mutual authentication between a server and a user, and allowed the user to anonymously interact with the server to establish a shared session key. However, in 2011, Niu et al. have proved that Tseng et al.'s protocol cannot guarantee user anonymity and protocol security when there is an internal adversary who is a legitimate user. Also it cannot provide perfect forward secrecy. Then Niu et al. introduced a trust third party (UP) into their protocol designing (Niu et al.'s protocol). But according to our research, Niu et al.'s protocol is found to have several unsatisfactory drawbacks. Based on reconsidering Tseng et al.'s protocol without introducing UP, we give some improvements to meet the original security and performance requirements. Meanwhile our proposed protocol overcomes the security flaws of Tseng et al.'s protocol. (C) 2011 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available