4.7 Article

Security improvement on an anonymous key agreement protocol based on chaotic maps

出版社

ELSEVIER
DOI: 10.1016/j.cnsns.2011.11.025

关键词

Key agreement; Chaotic maps; User anonymity; Contributory property; Protocol security

资金

  1. National Natural Science Foundation of China [60903216]
  2. National High-Tech Key Program of China [2009AA012002]
  3. National S& T Major Project of China [2010ZX03003-002, 2011ZX03005-006]

向作者/读者索取更多资源

In 2009, Tseng et al. proposed a password sharing and chaotic map based key agreement protocol (Tseng et al.'s protocol). They claimed that the protocol provided mutual authentication between a server and a user, and allowed the user to anonymously interact with the server to establish a shared session key. However, in 2011, Niu et al. have proved that Tseng et al.'s protocol cannot guarantee user anonymity and protocol security when there is an internal adversary who is a legitimate user. Also it cannot provide perfect forward secrecy. Then Niu et al. introduced a trust third party (UP) into their protocol designing (Niu et al.'s protocol). But according to our research, Niu et al.'s protocol is found to have several unsatisfactory drawbacks. Based on reconsidering Tseng et al.'s protocol without introducing UP, we give some improvements to meet the original security and performance requirements. Meanwhile our proposed protocol overcomes the security flaws of Tseng et al.'s protocol. (C) 2011 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据