We found a match
Your institution may have rights to this item. Sign in to continue.
- Title
An extended chaotic maps-based key agreement protocol with user anonymity.
- Authors
Lee, Cheng-Chi; Chen, Chin-Ling; Wu, Chia-Ying; Huang, Shiow-Yuan
- Abstract
A key agreement protocol is used to derive a shared secure session key by two or more parties, but no party can predetermine the resulting value. Users can securely exchange information over an open network by using the shared session key to encrypt/decrypt secure information. Recently, several key agreement protocols based on chaotic maps are proposed. Xiao et al. proposed a novel key agreement protocol based on chaotic maps and claimed their protocol can resist the known attack which is proposed by Bergamo et al. However, Han et al. and Xiang et al. pointed out that the Xiao et al. protocol is still insecure. To overcome these attacks, we shall propose an extended chaotic maps-based key agreement protocol. The proposed protocol not only can resist these attacks, but also provide mutual authentication and user anonymity.
- Subjects
KEY agreement protocols (Computer network protocols); DATA encryption; CHEBYSHEV polynomials; CRYPTOGRAPHY; POLYNOMIALS
- Publication
Nonlinear Dynamics, 2012, Vol 69, Issue 1/2, p79
- ISSN
0924-090X
- Publication type
Article
- DOI
10.1007/s11071-011-0247-4