Chaotic maps-based three-party password-authenticated key agreement scheme

Since chaos theory related to cryptography has been addressed widely, many chaotic maps based two-party password-authenticated key agreement (2PAKA) schemes have been proposed. However, to the best of our knowledge, no chaotic maps based three-party password-authenticated key agreement (3PAKA) protocol without using a timestamp has been proposed, yet. In this paper, we propose the first chaotic maps-based 3PAKA protocol without a timestamp. The proposed protocol is not based on the traditional public key cryptosystem but is based on chaotic maps, which not only achieves perfect forward secrecy without using a timestamp, modular exponentiation and scalar multiplication on an elliptic curve, but is also robust to resist various attacks such as password guessing attacks, impersonation attacks, man-in-the-middle attacks, etc.

[1]  Kefei Chen,et al.  Cryptanalysis and enhancements of efficient three‐party password‐based key exchange scheme , 2013, Int. J. Commun. Syst..

[2]  Peilin Hong,et al.  Security improvement on an anonymous key agreement protocol based on chaotic maps , 2012 .

[3]  Peng Gong,et al.  Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials , 2013, Nonlinear Dynamics.

[4]  Ljupco Kocarev,et al.  Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.

[5]  Zhi-hui Li,et al.  Fast algorithms of public key cryptosystem based on Chebyshev polynomials over finite field , 2011 .

[6]  Majid Khan,et al.  An efficient method for the construction of block cipher with multi-chaotic systems , 2013 .

[7]  Muhammad Khurram Khan,et al.  Cryptanalysis of a key agreement protocol based on chaotic Hash , 2013, Int. J. Electron. Secur. Digit. Forensics.

[8]  Cheng-Chi Lee,et al.  A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2013 .

[9]  Tao Xiang,et al.  On the security of a novel key agreement protocol based on chaotic maps , 2009 .

[10]  Zuowen Tan,et al.  A chaotic maps-based authenticated key agreement protocol with strong anonymity , 2013 .

[11]  Sirma Yavuz,et al.  Designing chaotic S-boxes based on time-delay chaotic system , 2013 .

[12]  Song Han,et al.  Chaotic map based key agreement with/out clock synchronization , 2009 .

[13]  Xingyuan Wang,et al.  An anonymous key agreement protocol based on chaotic maps , 2011 .

[14]  Eun-Jun Yoon,et al.  Efficiency and security problems of anonymous key agreement protocol based on chaotic maps , 2012 .

[15]  Alfredo De Santis,et al.  Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.

[16]  Kwok-Wo Wong,et al.  An efficient entire chaos-based scheme for deniable authentication , 2005 .

[17]  Eunjun Yoon,et al.  An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map , 2011 .

[18]  Tariq Shah,et al.  A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm , 2012, Nonlinear Dynamics.

[19]  Ping Li,et al.  A secure chaotic maps-based key agreement protocol without using smart cards , 2012 .

[20]  M. Baptista Cryptography with chaos , 1998 .

[21]  Wuu Yang,et al.  A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.

[22]  Xiaofeng Liao,et al.  A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..

[23]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[24]  Chin-Chen Chang,et al.  Chaotic maps-based password-authenticated key agreement using smart cards , 2013, Commun. Nonlinear Sci. Numer. Simul..

[25]  Xiaofeng Liao,et al.  A chaos-based hash function with both modification detection and localization capabilities , 2010 .

[26]  Song Han,et al.  Security of a key agreement protocol based on chaotic maps , 2008 .

[27]  Jiashu Zhang,et al.  Secure group key agreement protocol based on chaotic Hash , 2010, Inf. Sci..

[28]  Xiaofeng Liao,et al.  Using time-stamp to improve the security of a chaotic maps-based key agreement protocol , 2008, Inf. Sci..

[29]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[30]  Jun-Han Yang,et al.  Provably secure three-party password authenticated key exchange protocol in the standard model , 2012, J. Syst. Softw..

[31]  Cheng-Chi Lee,et al.  A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013 .

[32]  Yixian Yang,et al.  Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol , 2012 .

[33]  Tariq Shah,et al.  An efficient approach for the construction of LFT S-boxes using chaotic logistic map , 2012, Nonlinear Dynamics.

[34]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[35]  Xing-yuan Wang,et al.  An improved key agreement protocol based on chaos , 2010 .

[36]  Gonzalo Alvarez,et al.  Security problems with a chaos-based deniable authentication scheme , 2004, nlin/0412023.