Nonlinear Dynamics

, Volume 73, Issue 1–2, pp 125–132 | Cite as

A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps

Original Paper


In this paper, we propose a scheme utilizing three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps, which is more efficient and secure than previously proposed schemes. In order to enhance the efficiency and security, we use the extended chaotic maps to encrypt and decrypt the information transmitted by the user or the server. In addition, the proposed protocol provides user anonymity to guarantee the identity of users, which is transmitted in the insecure public network.


Anonymity Chaotic maps Authenticated key exchange Password-based Three-party 



This research was partially supported by the National Science Council, Taiwan, R.O.C., under contract no.: NSC 101-2221-E-030-018 and NSC 101-2221-E-165-002. We also thank Morton W. Belcher, III, M.S.L.S., for his opinions with regard to this research project.


  1. 1.
    Abdalla, M., Pointcheval, D.: Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Lecture Notes in Computer Science, vol. 3570, pp. 341–356 (2005) Google Scholar
  2. 2.
    Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE Computer Society Symposium on Security and Privacy, pp. 72–84 (1992) CrossRefGoogle Scholar
  3. 3.
    Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L.: Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I 52(7), 1382–1393 (2005) MathSciNetCrossRefGoogle Scholar
  4. 4.
    Chang, T.Y., Hwang, M.S., Yang, W.P.: A communication-efficient three-party password authenticated key exchange protocol. Inf. Sci. 181, 217–226 (2011) MathSciNetCrossRefGoogle Scholar
  5. 5.
    Chang, T.Y., Yang, W.P., Hwang, M.S.: Simple authenticated key agreement and protected password change protocol. Comput. Math. Appl. 49, 703–714 (2005) MathSciNetMATHCrossRefGoogle Scholar
  6. 6.
    Deng, M., Ma, J., Le, F.: Universally composable three party password-based key exchange protocol. China Commun. 6(3), 150–154 (2009) Google Scholar
  7. 7.
    Han, S., Chang, E.: Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 39(3), 1283–1289 (2009) MathSciNetMATHCrossRefGoogle Scholar
  8. 8.
    Hassan, M.I., Abdullah, A.: A new grid resource discovery framework. Int. Arab J. Inf. Technol. 8(1), 99–107 (2011) Google Scholar
  9. 9.
    He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012) MathSciNetMATHCrossRefGoogle Scholar
  10. 10.
    Huang, H.F.: A simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 22(7), 857–862 (2009) CrossRefGoogle Scholar
  11. 11.
    Lee, C.C., Chang, R.X., Ko, H.J.: Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy. Int. J. Found. Comput. Sci. 21(6), 979–991 (2010) MathSciNetMATHCrossRefGoogle Scholar
  12. 12.
    Lee, C.C., Chang, Y.F.: On security of a practical three-party key exchange protocol with round efficiency. Inf. Technol. Control 37(4), 333–335 (2008) MathSciNetGoogle Scholar
  13. 13.
    Lee, C.C., Chen, S.D., Chen, C.L.: A computation-efficient three-party encrypted key exchange protocol. Appl. Math. Inf. Sci. 6(3), 573–579 (2012) MathSciNetGoogle Scholar
  14. 14.
    Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012) MathSciNetMATHCrossRefGoogle Scholar
  15. 15.
    Lee, T.F., Hwang, T., Lin, C.L.: Enhanced three-party encrypted key exchange without server public keys. Comput. Secur. 23(7), 571–577 (2004) CrossRefGoogle Scholar
  16. 16.
    Lee, S.W., Kim, H.S., Yoo, K.Y.: Efficient verifier-based key agreement protocol for three parties without server’s public key. Appl. Math. Comput. 167(2), 996–1003 (2005) MathSciNetMATHCrossRefGoogle Scholar
  17. 17.
    Lin, C.L., Sun, H.M., Steiner, M., Hwang, T.: Three-party encrypted key exchange without server public keys. IEEE Commun. Lett. 5(12), 497–499 (2001) CrossRefGoogle Scholar
  18. 18.
    Lin, J.P., Fu, J.M.: Authenticated key agreement scheme with privacy-protection in the three-party setting. Int. J. Netw. Secur. 15(3), 149–159 (2013) MathSciNetGoogle Scholar
  19. 19.
    Lo, J.W., Lee, J.Z., Hwang, M.S., Chu, Y.P.: An advanced password authenticated key exchange protocol for imbalanced wireless networks. J. Internet Technol. 11(7), 997–1004 (2010) Google Scholar
  20. 20.
    Lo, J.W., Lin, S.C., Hwang, M.S.: A parallel password-authenticated key exchange protocol for wireless environments. Inf. Technol. Control 39(2), 146–151 (2010) Google Scholar
  21. 21.
    Lou, D.C., Huang, H.F.: Efficient three-party password-based key exchange scheme. Int. J. Commun. Syst. 24(4), 504–512 (2011) CrossRefGoogle Scholar
  22. 22.
    Lu, R., Cao, Z.: Simple three-party key exchange protocol. Comput. Secur. 26(1), 94–97 (2007) CrossRefGoogle Scholar
  23. 23.
    Mason, J.C., Handscomb, D.C.: Chebyshev Polynomials. Chapman & Hall/CRC Press, London (2003) MATHGoogle Scholar
  24. 24.
    Pathak, H.K., Sanghi, M.: Simple three party key exchange protocol via twin Diffie-Hellman problem. Int. J. Netw. Secur. 15(4), 201–209 (2013) Google Scholar
  25. 25.
    Sheu, L.J.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65(1–2), 103–108 (2011) MathSciNetMATHCrossRefGoogle Scholar
  26. 26.
    Tsai, C.S., Lee, C.C., Hwang, M.S.: Password authentication schemes: current status and key issues. Int. J. Netw. Secur. 3(2), 101–115 (2006) Google Scholar
  27. 27.
    Wang, X., Wang, X., Zhao, J., Zhang, Z.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63(4), 587–597 (2011) MathSciNetCrossRefGoogle Scholar
  28. 28.
    Wang, Y., Wong, K.W., Liao, X., Xiang, T.: A block cipher with dynamic s-boxes based on tent map. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3089–3099 (2009) MathSciNetMATHCrossRefGoogle Scholar
  29. 29.
    Wang, X.Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010) MATHCrossRefGoogle Scholar
  30. 30.
    Wu, S., Chen, K., Zhu, Y.: Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol. Int. Arab J. Inf. Technol. 10(3) (2013) Google Scholar
  31. 31.
    Xiao, D., Liao, X., Deng, S.: One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fractals 24(1), 65–71 (2005) MathSciNetMATHGoogle Scholar
  32. 32.
    Xiao, D., Shih, F., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254–2261 (2010) MathSciNetMATHCrossRefGoogle Scholar
  33. 33.
    Yong, Z., Jianfeng, M., Moon, S.: An improvement on a three-party password-based key exchange protocol using Weil pairing. Int. J. Netw. Secur. 11(1), 17–22 (2010) Google Scholar
  34. 34.
    Yoon, E.J., Yoo, K.Y.: Cryptanalysis of a simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 24(4), 532–542 (2011) CrossRefGoogle Scholar
  35. 35.
    Yoon, E.J., Yoo, K.Y.: Cryptanalysis of an efficient three-party password-based key exchange scheme. Proc. Eng. 29, 3972–3979 (2012) CrossRefGoogle Scholar
  36. 36.
    Yuan, W., Hu, L., Li, H., Chu, J.: Offline dictionary attack on a universally composable three-party password-based key exchange protocol. Proc. Eng. 15, 1691–1694 (2011) CrossRefGoogle Scholar
  37. 37.
    Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669–674 (2008) MathSciNetMATHCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Department of Library and Information ScienceFu Jen Catholic UniversitySinjhuang City, New Taipei CityROC
  2. 2.Department of Photonics & Communication EngineeringAsia UniversityWufeng Shiang, TaichungROC
  3. 3.Department of Information ManagementTainan University of TechnologyTainanROC

Personalised recommendations