An extended chaotic maps-based key agreement protocol with user anonymity
From MaRDI portal
Publication:1928918
DOI10.1007/s11071-011-0247-4zbMath1254.94038OpenAlexW2054405726MaRDI QIDQ1928918
Shiow-Yuan Huang, Chin-Ling Chen, Cheng-Chi Lee, Chia-Ying Wu
Publication date: 4 January 2013
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-011-0247-4
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (21)
Provably secure extended chaotic map-based three-party key agreement protocols using password authentication ⋮ A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps ⋮ Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy ⋮ A chaotic maps-based authenticated key agreement protocol with strong anonymity ⋮ Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol ⋮ A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps ⋮ Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials ⋮ A new digital signature scheme based on chaotic maps ⋮ A new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards ⋮ Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps ⋮ An efficient online/offline ID-based short signature procedure using extended chaotic maps ⋮ Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing ⋮ An extended chaotic-maps-based protocol with key agreement for multiserver environments ⋮ Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol ⋮ An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services ⋮ An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem ⋮ Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps ⋮ A revised key agreement protocol based on chaotic maps ⋮ Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
Cites Work
- Unnamed Item
- On the security of a novel key agreement protocol based on chaotic maps
- Chaotic map based key agreement with/out clock synchronization
- A block cipher with dynamic S-boxes based on tent map
- An anonymous key agreement protocol based on chaotic maps
- A new chaotic cryptosystem
- Security of a key agreement protocol based on chaotic maps
- One-way hash function construction based on the chaotic map with changeable-parameter
- An efficient entire chaos-based scheme for deniable authentication
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- A password authentication scheme over insecure networks
- New directions in cryptography
- Security of public-key cryptosystems based on Chebyshev polynomials
This page was built for publication: An extended chaotic maps-based key agreement protocol with user anonymity