Skip to main content
Log in

A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

In this paper, we propose a scheme utilizing three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps, which is more efficient and secure than previously proposed schemes. In order to enhance the efficiency and security, we use the extended chaotic maps to encrypt and decrypt the information transmitted by the user or the server. In addition, the proposed protocol provides user anonymity to guarantee the identity of users, which is transmitted in the insecure public network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Abdalla, M., Pointcheval, D.: Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Lecture Notes in Computer Science, vol. 3570, pp. 341–356 (2005)

    Google Scholar 

  2. Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE Computer Society Symposium on Security and Privacy, pp. 72–84 (1992)

    Chapter  Google Scholar 

  3. Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L.: Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I 52(7), 1382–1393 (2005)

    Article  MathSciNet  Google Scholar 

  4. Chang, T.Y., Hwang, M.S., Yang, W.P.: A communication-efficient three-party password authenticated key exchange protocol. Inf. Sci. 181, 217–226 (2011)

    Article  MathSciNet  Google Scholar 

  5. Chang, T.Y., Yang, W.P., Hwang, M.S.: Simple authenticated key agreement and protected password change protocol. Comput. Math. Appl. 49, 703–714 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  6. Deng, M., Ma, J., Le, F.: Universally composable three party password-based key exchange protocol. China Commun. 6(3), 150–154 (2009)

    Google Scholar 

  7. Han, S., Chang, E.: Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 39(3), 1283–1289 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  8. Hassan, M.I., Abdullah, A.: A new grid resource discovery framework. Int. Arab J. Inf. Technol. 8(1), 99–107 (2011)

    Google Scholar 

  9. He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  10. Huang, H.F.: A simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 22(7), 857–862 (2009)

    Article  Google Scholar 

  11. Lee, C.C., Chang, R.X., Ko, H.J.: Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy. Int. J. Found. Comput. Sci. 21(6), 979–991 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  12. Lee, C.C., Chang, Y.F.: On security of a practical three-party key exchange protocol with round efficiency. Inf. Technol. Control 37(4), 333–335 (2008)

    MathSciNet  Google Scholar 

  13. Lee, C.C., Chen, S.D., Chen, C.L.: A computation-efficient three-party encrypted key exchange protocol. Appl. Math. Inf. Sci. 6(3), 573–579 (2012)

    MathSciNet  Google Scholar 

  14. Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  15. Lee, T.F., Hwang, T., Lin, C.L.: Enhanced three-party encrypted key exchange without server public keys. Comput. Secur. 23(7), 571–577 (2004)

    Article  Google Scholar 

  16. Lee, S.W., Kim, H.S., Yoo, K.Y.: Efficient verifier-based key agreement protocol for three parties without server’s public key. Appl. Math. Comput. 167(2), 996–1003 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  17. Lin, C.L., Sun, H.M., Steiner, M., Hwang, T.: Three-party encrypted key exchange without server public keys. IEEE Commun. Lett. 5(12), 497–499 (2001)

    Article  Google Scholar 

  18. Lin, J.P., Fu, J.M.: Authenticated key agreement scheme with privacy-protection in the three-party setting. Int. J. Netw. Secur. 15(3), 149–159 (2013)

    MathSciNet  Google Scholar 

  19. Lo, J.W., Lee, J.Z., Hwang, M.S., Chu, Y.P.: An advanced password authenticated key exchange protocol for imbalanced wireless networks. J. Internet Technol. 11(7), 997–1004 (2010)

    Google Scholar 

  20. Lo, J.W., Lin, S.C., Hwang, M.S.: A parallel password-authenticated key exchange protocol for wireless environments. Inf. Technol. Control 39(2), 146–151 (2010)

    Google Scholar 

  21. Lou, D.C., Huang, H.F.: Efficient three-party password-based key exchange scheme. Int. J. Commun. Syst. 24(4), 504–512 (2011)

    Article  Google Scholar 

  22. Lu, R., Cao, Z.: Simple three-party key exchange protocol. Comput. Secur. 26(1), 94–97 (2007)

    Article  Google Scholar 

  23. Mason, J.C., Handscomb, D.C.: Chebyshev Polynomials. Chapman & Hall/CRC Press, London (2003)

    MATH  Google Scholar 

  24. Pathak, H.K., Sanghi, M.: Simple three party key exchange protocol via twin Diffie-Hellman problem. Int. J. Netw. Secur. 15(4), 201–209 (2013)

    Google Scholar 

  25. Sheu, L.J.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65(1–2), 103–108 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  26. Tsai, C.S., Lee, C.C., Hwang, M.S.: Password authentication schemes: current status and key issues. Int. J. Netw. Secur. 3(2), 101–115 (2006)

    Google Scholar 

  27. Wang, X., Wang, X., Zhao, J., Zhang, Z.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63(4), 587–597 (2011)

    Article  MathSciNet  Google Scholar 

  28. Wang, Y., Wong, K.W., Liao, X., Xiang, T.: A block cipher with dynamic s-boxes based on tent map. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3089–3099 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  29. Wang, X.Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)

    Article  MATH  Google Scholar 

  30. Wu, S., Chen, K., Zhu, Y.: Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol. Int. Arab J. Inf. Technol. 10(3) (2013)

  31. Xiao, D., Liao, X., Deng, S.: One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fractals 24(1), 65–71 (2005)

    MathSciNet  MATH  Google Scholar 

  32. Xiao, D., Shih, F., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254–2261 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  33. Yong, Z., Jianfeng, M., Moon, S.: An improvement on a three-party password-based key exchange protocol using Weil pairing. Int. J. Netw. Secur. 11(1), 17–22 (2010)

    Google Scholar 

  34. Yoon, E.J., Yoo, K.Y.: Cryptanalysis of a simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 24(4), 532–542 (2011)

    Article  Google Scholar 

  35. Yoon, E.J., Yoo, K.Y.: Cryptanalysis of an efficient three-party password-based key exchange scheme. Proc. Eng. 29, 3972–3979 (2012)

    Article  Google Scholar 

  36. Yuan, W., Hu, L., Li, H., Chu, J.: Offline dictionary attack on a universally composable three-party password-based key exchange protocol. Proc. Eng. 15, 1691–1694 (2011)

    Article  Google Scholar 

  37. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669–674 (2008)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This research was partially supported by the National Science Council, Taiwan, R.O.C., under contract no.: NSC 101-2221-E-030-018 and NSC 101-2221-E-165-002. We also thank Morton W. Belcher, III, M.S.L.S., for his opinions with regard to this research project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chun-Ta Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, CC., Li, CT. & Hsu, CW. A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn 73, 125–132 (2013). https://doi.org/10.1007/s11071-013-0772-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-013-0772-4

Keywords

Navigation