A Multi-server Authenticated Key Agreement Protocol with Privacy preserving Based on Chaotic Maps in Random Oracle Model
نویسندگان
چکیده
In the research literature, a typical authenticated key agreement protocol is designed to realize mutual authentication and key secrecy. In a network, as a crucial cryptographic primitive, key agreement can establish secure communication channels for communication entities. Meanwhile, the users privacy is particularity important, especially for multi-server authentication environment. Network privacy security means that the personal data and online data are not peep, intrusion, interference, illegal collection and utilization. In our paper, we propose a robust chaotic maps-based authentication key agreement scheme with privacy protection using smart cards for multi-server authentication environment. The key idea of our proposed scheme is to adopt chaotic maps for mutual authentication, not to encrypt/decrypt messages transferred between user and server, which can make our proposed scheme much more efficient. In addition, our protocol can realize the users privacy preserving and various common security features. As a whole, compared with other related protocol, our proposed protocol is more secure and practical.
منابع مشابه
A Novel Client-to-Client Password-Authenticated Key Exchange Protocol Using Chaotic Maps in The Standard Model
Until now, the overwhelming majority of password-authenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four security models (heuristic security, random oracle, ideal cipher and standard model). However, with rapid changes in the modern communication environment such as wireless mesh networks and cloud s...
متن کاملA Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards Multiple Servers to Server
With rapid changes in the modern communication environment such as wireless mesh networks and cloud storing, it is necessary to put forward a kind more flexible and general architecture to adapt it. But the overwhelming majority of passwordauthenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four secur...
متن کاملPassword-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model
Nowadays, the overwhelming majority of password-authenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four security models (heuristic security, random oracle, ideal cipher and standard model). However, with rapid changes in the modern communication environment such as wireless mesh networks and cloud st...
متن کاملA Novel and Provable Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps towards Mobile Network
Key agreement is a crucial cryptographic primitive for building secure communication channels between two parties in a network. In the research literature a typical protocol aims for key secrecy and mutual authentication. However, there are many important practical scenarios where privacy protection is more desirable, especially for social network. Network privacy security means that the person...
متن کاملA Provably Password Authenticated Key Exchange Scheme Based on Chaotic Maps in Different Realm
Until now, the overwhelming majority of passwordauthenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four security models (heuristic security, random oracle, ideal cipher and standard model). However, with rapid changes in the modern communication environment such as wireless mesh networks and cloud st...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015