Abstract
In this paper, we propose a scheme utilizing three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps, which is more efficient and secure than previously proposed schemes. In order to enhance the efficiency and security, we use the extended chaotic maps to encrypt and decrypt the information transmitted by the user or the server. In addition, the proposed protocol provides user anonymity to guarantee the identity of users, which is transmitted in the insecure public network.
Similar content being viewed by others
References
Abdalla, M., Pointcheval, D.: Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Lecture Notes in Computer Science, vol. 3570, pp. 341–356 (2005)
Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE Computer Society Symposium on Security and Privacy, pp. 72–84 (1992)
Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L.: Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I 52(7), 1382–1393 (2005)
Chang, T.Y., Hwang, M.S., Yang, W.P.: A communication-efficient three-party password authenticated key exchange protocol. Inf. Sci. 181, 217–226 (2011)
Chang, T.Y., Yang, W.P., Hwang, M.S.: Simple authenticated key agreement and protected password change protocol. Comput. Math. Appl. 49, 703–714 (2005)
Deng, M., Ma, J., Le, F.: Universally composable three party password-based key exchange protocol. China Commun. 6(3), 150–154 (2009)
Han, S., Chang, E.: Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 39(3), 1283–1289 (2009)
Hassan, M.I., Abdullah, A.: A new grid resource discovery framework. Int. Arab J. Inf. Technol. 8(1), 99–107 (2011)
He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)
Huang, H.F.: A simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 22(7), 857–862 (2009)
Lee, C.C., Chang, R.X., Ko, H.J.: Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy. Int. J. Found. Comput. Sci. 21(6), 979–991 (2010)
Lee, C.C., Chang, Y.F.: On security of a practical three-party key exchange protocol with round efficiency. Inf. Technol. Control 37(4), 333–335 (2008)
Lee, C.C., Chen, S.D., Chen, C.L.: A computation-efficient three-party encrypted key exchange protocol. Appl. Math. Inf. Sci. 6(3), 573–579 (2012)
Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)
Lee, T.F., Hwang, T., Lin, C.L.: Enhanced three-party encrypted key exchange without server public keys. Comput. Secur. 23(7), 571–577 (2004)
Lee, S.W., Kim, H.S., Yoo, K.Y.: Efficient verifier-based key agreement protocol for three parties without server’s public key. Appl. Math. Comput. 167(2), 996–1003 (2005)
Lin, C.L., Sun, H.M., Steiner, M., Hwang, T.: Three-party encrypted key exchange without server public keys. IEEE Commun. Lett. 5(12), 497–499 (2001)
Lin, J.P., Fu, J.M.: Authenticated key agreement scheme with privacy-protection in the three-party setting. Int. J. Netw. Secur. 15(3), 149–159 (2013)
Lo, J.W., Lee, J.Z., Hwang, M.S., Chu, Y.P.: An advanced password authenticated key exchange protocol for imbalanced wireless networks. J. Internet Technol. 11(7), 997–1004 (2010)
Lo, J.W., Lin, S.C., Hwang, M.S.: A parallel password-authenticated key exchange protocol for wireless environments. Inf. Technol. Control 39(2), 146–151 (2010)
Lou, D.C., Huang, H.F.: Efficient three-party password-based key exchange scheme. Int. J. Commun. Syst. 24(4), 504–512 (2011)
Lu, R., Cao, Z.: Simple three-party key exchange protocol. Comput. Secur. 26(1), 94–97 (2007)
Mason, J.C., Handscomb, D.C.: Chebyshev Polynomials. Chapman & Hall/CRC Press, London (2003)
Pathak, H.K., Sanghi, M.: Simple three party key exchange protocol via twin Diffie-Hellman problem. Int. J. Netw. Secur. 15(4), 201–209 (2013)
Sheu, L.J.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65(1–2), 103–108 (2011)
Tsai, C.S., Lee, C.C., Hwang, M.S.: Password authentication schemes: current status and key issues. Int. J. Netw. Secur. 3(2), 101–115 (2006)
Wang, X., Wang, X., Zhao, J., Zhang, Z.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63(4), 587–597 (2011)
Wang, Y., Wong, K.W., Liao, X., Xiang, T.: A block cipher with dynamic s-boxes based on tent map. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3089–3099 (2009)
Wang, X.Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)
Wu, S., Chen, K., Zhu, Y.: Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol. Int. Arab J. Inf. Technol. 10(3) (2013)
Xiao, D., Liao, X., Deng, S.: One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fractals 24(1), 65–71 (2005)
Xiao, D., Shih, F., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254–2261 (2010)
Yong, Z., Jianfeng, M., Moon, S.: An improvement on a three-party password-based key exchange protocol using Weil pairing. Int. J. Netw. Secur. 11(1), 17–22 (2010)
Yoon, E.J., Yoo, K.Y.: Cryptanalysis of a simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 24(4), 532–542 (2011)
Yoon, E.J., Yoo, K.Y.: Cryptanalysis of an efficient three-party password-based key exchange scheme. Proc. Eng. 29, 3972–3979 (2012)
Yuan, W., Hu, L., Li, H., Chu, J.: Offline dictionary attack on a universally composable three-party password-based key exchange protocol. Proc. Eng. 15, 1691–1694 (2011)
Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669–674 (2008)
Acknowledgements
This research was partially supported by the National Science Council, Taiwan, R.O.C., under contract no.: NSC 101-2221-E-030-018 and NSC 101-2221-E-165-002. We also thank Morton W. Belcher, III, M.S.L.S., for his opinions with regard to this research project.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, CC., Li, CT. & Hsu, CW. A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn 73, 125–132 (2013). https://doi.org/10.1007/s11071-013-0772-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-013-0772-4