Skip to main content

An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password

  • Conference paper
  • First Online:
Book cover Cloud Computing and Security (ICCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10039))

Included in the following conference series:

Abstract

Chaotic maps have been used in the design of cryptosystem due to its excellent properties. Recently, researchers have proposed many authenticated key agreement protocols based on the chaotic maps. However, most of those protocols use the password to achieve the key agreement, and it will lead some security problems. First, the server has to store a sensitive verification table, and it is dangerous if the server has been compromised or the verification table was stolen. Besides, the low entropy passwords are vulnerable to some password related attacks, such as insider attack and password guessing attack. To resolve the aforementioned problems, this paper propose an extended chaotic maps based authenticated key agreement protocol without using password, where the server just needs to maintain a master secret key and the user just needs to hold a secret key, then they can achieve the key agreement. Compared with other related protocols, the proposed protocol not only keeps the efficiency, but also enhances the security. So, it is more suitable for client/server environment.

This work was supported by the National Natural Science Foundation of China under Grant Nos. 61300220, 61572013 and 61572188, and the Scientific Research Fund of Hunan Provincial Education Department under Grant Nos. 16B089 and 10C0688.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guo, P., Wang, J., Li, B., Lee, S.Y.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–936 (2014)

    Google Scholar 

  2. Shen, J., Tan, H.W., Wang, J., Wang, J.W., Lee, S.Y.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171–178 (2015)

    Google Scholar 

  3. Ren, Y.J., Shen, J., Wang, J., Han, J., Lee, S.Y.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)

    Google Scholar 

  4. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  5. Xiong, H., Chen, Z., Li, F.: New identity-based three-party authenticated key agreement protocol with provable security. J. Netw. Comput. Appl. 36(2), 927–932 (2013)

    Article  Google Scholar 

  6. He, D., Padhye, S., Chen, J.: An efficient certificateless two-party authenticated key agreement protocol. Comput. Math. Appl. 64(6), 1914–1926 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  7. Hölbl, M., Welzer, T., Brumen, B.: An improved two-party identity-based authenticated key agreement protocol using pairings. J. Comput. Syst. Sci. 78(1), 142–150 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  8. He, D., Chen, J., Hu, J.: An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf. Fusion 13(3), 223–230 (2012)

    Article  Google Scholar 

  9. Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136–1142 (2007)

    Article  MathSciNet  Google Scholar 

  10. Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos, Solitons Fractals 38(3), 764–768 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  11. Xiang, T., Wong, K.W., Liao, X.: On the security of a novel key agreement protocol based on chaotic maps. Chaos, Solitons Fractals 40(2), 672–675 (2009)

    Article  MATH  Google Scholar 

  12. Xiao, D., Liao, X., Deng, S.: Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178(6), 1598–1602 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  13. Tseng, H.R., Jan, R.H., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: Proceedings of 2009 IEEE International Conference on Communications (ICC 2009), pp. 1–6. IEEE, June 2009

    Google Scholar 

  14. Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986–1992 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  15. Yoon, E.J.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2735–2740 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  16. Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969–2977 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  17. Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  18. He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  19. Guo, X., Zhang, J.: Secure group key agreement protocol based on chaotic hash. Inf. Sci. 180(20), 4069–4074 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  20. Gong, P., Li, P., Shi, W.: A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dyn. 70(4), 2401–2406 (2012)

    Article  MathSciNet  Google Scholar 

  21. Wang, X.Y., Luan, D.P.: A secure key agreement protocol based on chaotic maps. Chin. Phys. B 22(11), 110503 (2013)

    Article  MathSciNet  Google Scholar 

  22. Shu, J.: An authenticated key agreement protocol based on extended chaotic maps. Acta Phys. Sinica 63(5), 050507 (2014)

    Google Scholar 

  23. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3), 669–674 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  24. Jabbari, A., Bagherzadeh, J.: A revised key agreement protocol based on chaotic maps. Nonlinear Dyn. 78(1), 669–680 (2014)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiong Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Li, X., Liao, J., Liang, W., Zhao, J. (2016). An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48671-0_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48670-3

  • Online ISBN: 978-3-319-48671-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics