Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
From MaRDI portal
Publication:1954788
DOI10.1155/2012/454823zbMath1264.94100OpenAlexW1976559448WikidataQ58911676 ScholiaQ58911676MaRDI QIDQ1954788
Lixiang Li, Hong Lai, Jinghua Xiao, Yi-Xian Yang
Publication date: 11 June 2013
Published in: Mathematical Problems in Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1155/2012/454823
Cryptography (94A60) Orthogonal polynomials and functions of hypergeometric type (Jacobi, Laguerre, Hermite, Askey scheme, etc.) (33C45) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (10)
Provably secure extended chaotic map-based three-party key agreement protocols using password authentication ⋮ Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials ⋮ Chaotic maps-based three-party password-authenticated key agreement scheme ⋮ Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card ⋮ A new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps ⋮ A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps ⋮ Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol ⋮ Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
Cites Work
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- A model to partly but reliably distinguish DDOS flood traffic from aggregated one
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
- Topics in Cryptology – CT-RSA 2005
This page was built for publication: Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol