期刊
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION
卷 17, 期 7, 页码 2969-2977出版社
ELSEVIER
DOI: 10.1016/j.cnsns.2011.11.025
关键词
Key agreement; Chaotic maps; User anonymity; Contributory property; Protocol security
类别
资金
- National Natural Science Foundation of China [60903216]
- National High-Tech Key Program of China [2009AA012002]
- National S& T Major Project of China [2010ZX03003-002, 2011ZX03005-006]
In 2009, Tseng et al. proposed a password sharing and chaotic map based key agreement protocol (Tseng et al.'s protocol). They claimed that the protocol provided mutual authentication between a server and a user, and allowed the user to anonymously interact with the server to establish a shared session key. However, in 2011, Niu et al. have proved that Tseng et al.'s protocol cannot guarantee user anonymity and protocol security when there is an internal adversary who is a legitimate user. Also it cannot provide perfect forward secrecy. Then Niu et al. introduced a trust third party (UP) into their protocol designing (Niu et al.'s protocol). But according to our research, Niu et al.'s protocol is found to have several unsatisfactory drawbacks. Based on reconsidering Tseng et al.'s protocol without introducing UP, we give some improvements to meet the original security and performance requirements. Meanwhile our proposed protocol overcomes the security flaws of Tseng et al.'s protocol. (C) 2011 Elsevier B.V. All rights reserved.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据