A new three-party-authenticated key agreement scheme based on chaotic maps without password table

Three-party-authenticated key agreement allows two users to establish a common session key through a trusted server via an insecure communication channel. Early authenticated key agreement schemes were mostly based on either pairing operations, hash operations, or modular exponentiation operations. In 2011, Wang and Zhao took a new path and built their three-party-authenticated key agreement scheme on the basis of chaotic maps. By applying Chebyshev chaotic maps, Wang and Zhao succeeded in lifting their scheme up to a higher level of efficiency and security. In this paper, we shall propose a new three-party-authenticated key agreement scheme based on chaotic maps that can do without passwords. Keeping no password table, our new scheme is completely resistant to password guessing attacks. Besides that, our scheme also offers thorough privacy protection to the users, so the user forgery attack can cause no damage. Compared with the schemes currently available including Wang and Zhao’s work, our new scheme obviously provides better security.

[1]  Xingyuan Wang,et al.  An anonymous key agreement protocol based on chaotic maps , 2011 .

[2]  Eun-Jun Yoon,et al.  Efficiency and security problems of anonymous key agreement protocol based on chaotic maps , 2012 .

[3]  Marcelo C. M. Teixeira,et al.  Design of a Takagi-Sugeno Fuzzy Regulator for a Set of Operation Points , 2012 .

[4]  Peilin Hong,et al.  Security improvement on an anonymous key agreement protocol based on chaotic maps , 2012 .

[5]  Mohammad Sabzinejad Farash,et al.  An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps , 2014 .

[6]  Mahmoud Ahmadian-Attari,et al.  An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems , 2014, Inf. Technol. Control..

[7]  Mahmoud Ahmadian-Attari,et al.  An Enhanced Authenticated Key Agreement for Session Initiation Protocol , 2013, Inf. Technol. Control..

[8]  Mahmoud Ahmadian-Attari,et al.  A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks , 2014, The Journal of Supercomputing.

[9]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[10]  Yixian Yang,et al.  Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol , 2012 .

[11]  Cheng-Chi Lee,et al.  A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013 .

[12]  Mohammad Sabzinejad Farash An improved password-based authentication scheme for session initiation protocol using smart cards without verification table , 2017, Int. J. Commun. Syst..

[13]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[14]  Mahmoud Ahmadian-Attari,et al.  An efficient client–client password-based authentication scheme with provable security , 2014, The Journal of Supercomputing.

[15]  T. J. Rivlin The Chebyshev polynomials , 1974 .

[16]  Mahmoud Ahmadian-Attari,et al.  An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards , 2016, Int. J. Commun. Syst..

[17]  Cheng-Chi Lee A simple key agreement scheme based on chaotic maps for VSAT satellite communications , 2013, Int. J. Satell. Commun. Netw..

[18]  Cheng-Chi Lee,et al.  A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2013 .

[19]  Peng Gong,et al.  Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials , 2013, Nonlinear Dynamics.

[20]  Cheng-Chi Lee,et al.  An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol , 2013, J. Comput. Methods Sci. Eng..

[21]  Wuu Yang,et al.  A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.

[22]  Qi Xie,et al.  Chaotic maps-based three-party password-authenticated key agreement scheme , 2013 .

[23]  Cheng-Chi Lee,et al.  An extended chaotic maps-based key agreement protocol with user anonymity , 2011, Nonlinear Dynamics.

[24]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[25]  Chin-Chen Chang,et al.  Chaotic maps-based password-authenticated key agreement using smart cards , 2013, Commun. Nonlinear Sci. Numer. Simul..

[26]  Cheng-Chi Lee,et al.  A Computation-Efficient Three-Party Encrypted Key Exchange Protocol , 2012 .

[27]  Cheng-Chi Lee,et al.  An extended chaotic-maps-based protocol with key agreement for multiserver environments , 2013, Nonlinear Dynamics.

[28]  Xing-yuan Wang,et al.  An improved key agreement protocol based on chaos , 2010 .