Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
From MaRDI portal
Publication:335718
DOI10.1007/s11071-015-2467-5zbMath1353.94080OpenAlexW1961388012MaRDI QIDQ335718
Abdulhameed Alelaiwi, Guangsong Li, Qi Jiang, Fushan Wei, Shuai Fu, Jian-Feng Ma
Publication date: 2 November 2016
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-015-2467-5
Applications of dynamical systems (37N99) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- Chaotic maps-based password-authenticated key agreement using smart cards
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- An anonymous key agreement protocol based on chaotic maps
- Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
- An extended chaotic maps-based key agreement protocol with user anonymity
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- Chaotic maps-based three-party password-authenticated key agreement scheme
- A fuzzy vault scheme
- An extended chaotic-maps-based protocol with key agreement for multiserver environments
- A logic of authentication
- Examining smart-card security under the threat of power analysis attacks
- Security of public-key cryptosystems based on Chebyshev polynomials
- Advances in Cryptology - EUROCRYPT 2004
This page was built for publication: Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy