A chaotic maps-based key agreement protocol that preserves user anonymity

Huei Ru Tseng*, Rong Hong Jan, Wuu Yang

*此作品的通信作者

研究成果: Conference contribution同行評審

84 引文 斯高帕斯(Scopus)

摘要

A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that both of them agree on the established session keys for use in subsequent communications. Recently, several key agreement protocols based on chaotic maps are proposed. These protocols require a verification table to verify the legitimacy of a user. Since this approach clearly incurs the risk of tampering and the cost of managing the table and suffers from the stolen-verifier attack, we propose a novel key agreement protocol based on chaotic maps to enhance the security. The proposed protocol not only achieves mutual authentication without verification tables, but also allows users to anonymously interact with the server. Moreover, security of the proposed protocol is modelled and analyzed with Petri nets. Our analysis shows that the proposed protocol can successfully defend replay attacks, forgery attacks, and stolen-verifier attacks.

原文English
主出版物標題Proceedings - 2009 IEEE International Conference on Communications, ICC 2009
DOIs
出版狀態Published - 2009
事件2009 IEEE International Conference on Communications, ICC 2009 - Dresden, 德國
持續時間: 14 6月 200918 6月 2009

出版系列

名字IEEE International Conference on Communications
ISSN(列印)0536-1486

Conference

Conference2009 IEEE International Conference on Communications, ICC 2009
國家/地區德國
城市Dresden
期間14/06/0918/06/09

指紋

深入研究「A chaotic maps-based key agreement protocol that preserves user anonymity」主題。共同形成了獨特的指紋。

引用此