Presentation of a Two-Party Key Agreement Protocol based on Chaos

Publish Year: 1392
نوع سند: مقاله کنفرانسی
زبان: English
View: 883

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

EOESD01_113

تاریخ نمایه سازی: 11 خرداد 1393

Abstract:

One of the most important cryptography protocols is the key agreement protocol in which used to build a shared secret key between two participants through an insecure channel. To increase the security and efficiency of these protocols, many researches have been performed. Recently, in 2012, Lee et al. proposed a key agreement protocol using smart cards and claimed their protocol is secure and efficient. However, He et al. proved that the Lee et al.'s protocol vulnerable to the privileged insider attack and the denial of service attack, and also the protocol cannot protect the user's true identity. We also point out the protocol requires timestamp information and the cost of card and reader makes this protocol costly. To overcome these weaknesses, we propose a key agreement protocol based on Chebyshev chaotic map without using smart card. Our protocol allows users to anonymously interact with the server. Moreover, analysis shows that the proposed protocol can successfully resist the current attacks.

Authors

Nahid Yahyapoor

Department of Electrical Engineering, Khavaran Institute of Higher Education, Mashhad

Saeed Shaerbaf

Department of Electrical Engineering, International Universityof Imam Reza, Mashhad

Morteza Nikooghadam

Department of Computer Engineering, International Universityof Imam Reza, Mashhad

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Bergamo, P. , & Arco, P. D. , & Santis, ...
  • Diffie, W. _ & Hellman, M. (1976). New directions in ...
  • Han, S. (2008). Security of a key agreement protocol based ...
  • Han, S. , & Chang, E. (2009). Chaotic map based ...
  • He, D. , & Chen, Y. _ & Chen, J. ...
  • Kocarev, L. , & Tasev, Z. (2003). Public-key encryption based ...
  • Lee, C. C. , & Chen, C. C. , & ...
  • Niu, Y. , & Wang, X. (2011). An anonymous key ...
  • Tseng, H. R. , &c Jan, R. H. _ & ...
  • Wang, X. , &c Zhao, J. (2010). An improved key ...
  • Xiang, T. , & Wong, K. , & Liao, X. ...
  • Xiao, D. _ & Liao, X. , & Deng, S. ...
  • Yoon, E. J. (2012). Efficiency and security problems of anonymous ...
  • Yoon, E. J. , & Jeon, I. S. (2011). An ...
  • Zhang, L. (2008). Cryptanalysis of the public key encryption based ...
  • نمایش کامل مراجع