Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








412 Hits in 5.3 sec

Enhancing The Security of Chaotic Maps-based Password-Authenticated Key agreement Using Smart Card

Na Lin, Hongfeng Zhu
2017 Journal of Information Hiding and Multimedia Signal Processing  
Therefore, in this paper, we propose a secure chaotic maps-based password-authenticated key agreement using smart card.  ...  Recently, Guo and Chang proposed a novel password-authentication key agreement (PAKA) using smart card, this protocol utilizes chaotic maps instead of modular exponentiation and scalar multiplication operation  ...  This work is supported by the Liaoning Natural Science Foundation of China (Grant No. 2015020008) and Liaoning Provincial Natural Science Foundation of China (Grant No. 201602680).  ... 
dblp:journals/jihmsp/LinZ17 fatcat:lfuqzviburff5ng4zwcgwcmbrq

Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications

Cheng Guo, Chin-Chen Chang, Chin-Yu Sun
2013 Journal of Information Hiding and Multimedia Signal Processing  
Inspired by the key-agreement protocols based on chaotic maps, we proposed a novel, chaotic maps-based authentication and key-agreement protocol using smart cards for wireless communications.  ...  In recent years, most of the existing user authentication and key-agreement protocols with smart cards for wireless communications utilized modular exponential computing and scalar multiplication on elliptic  ...  In this section, we propose a chaotic maps-based mutual authentication and key-agreement protocol for wireless communications using smart cards that almost satisfies all the requirements of the existing  ... 
dblp:journals/jihmsp/Guo0S13 fatcat:r3hi3clo4begpexqxdp7ppzl7e

Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map

Chien-Lung Hsu, Tzu-Wei Lin
2013 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
This paper proposes a password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map. Properties of the proposed protocol are given below.  ...  A password authenticated key exchange protocol can be used to authenticate user's legitimacy and establish a secure communication between a user and his logon server by using his friendly memorized password  ...  This work was supported in part by National Science Council under the grants NSC 100-2628-H-182-001-MY3.  ... 
doi:10.1109/percomw.2013.6529462 dblp:conf/percom/HsuL13 fatcat:z4zfmjtnbbhr3cerabmhddg3yi

A New Authenticated Key Agreement Protocol based on Extended Chebyshev Maps

Aiwan Fan, Zhaofeng Yang, Haifeng Li
2017 Journal of Information Hiding and Multimedia Signal Processing  
So we propose a new authenticated key agreement protocol based on Chebyshev maps and extended chotic maps under multi-server environment.  ...  At last, we compare the new scheme to some other authenticated key agreement protocols, the experiment results show that our scheme has the efficiency and security.  ...  This work is supported by Science & Technology Planning Project of Henan Province under Grant No. 152102210193.  ... 
dblp:journals/jihmsp/FanYL17 fatcat:i22gjdh7dbecbhdtqz4edxxqqe

The Cryptanalysis of Lee's Chaotic Maps-Based Authentication and Key Agreement Scheme using Smart card for Telecare Medicine Information Systems [article]

Dheerendra MIshra
2013 arXiv   pre-print
Lee also presented an efficient chaotic map-based password authentication and key agreement scheme using Smart cards for TMIS.  ...  In 2013, Hao et al. presented chaotic maps-based password authentication scheme for TMIS. Recently, Lee identified that Hao et al.'  ...  In recent times may chaotic map-based remote user authentication scheme [14, 16, 21, 22, 28] have been proposed to enhance the security of mutual authentication and session key agreement.  ... 
arXiv:1310.5896v1 fatcat:v2epq4pywjhw7apxswo3dvkl2m

An Improved Password Authentication Scheme for Telecare Medical Information Systems Based on Chaotic Maps with Privacy Protection

Yang Sun
2016 Journal of Information Hiding and Multimedia Signal Processing  
Recently, Lu et al. proposed a secure smart card based authentication scheme for TMISs using enhanced chaotic maps.  ...  Chaos theory has been widely studied and adapted in cryptography for achieving some security mechanisms, such as encryption/decryption, key agreement and hash function.  ...  Next, we further proposed a secure biometric based authentication scheme for TMISs using enhanced chaotic maps to conquer the security flaws.  ... 
dblp:journals/jihmsp/Sun16 fatcat:33g2uzzuwrbqrpu3ojlby242hu

Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps

Tian-Fu Lee, Chia-Hung Hsiao, Shi-Han Hwang, Tsung-Hung Lin, Muhammad Khurram Khan
2017 PLoS ONE  
Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide  ...  This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps.  ...  Acknowledgments This research was supported by Ministry of Science and Technology under the grants MOST 105-2221-E-320-003 and by Tzu Chi University under the grants TCRPP105004.  ... 
doi:10.1371/journal.pone.0181744 pmid:28759615 pmcid:PMC5536435 fatcat:hwdkkozqircj3lgevrn2lb2vau

A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service

Jian Song, Guang-song Li, Bo-ru Xu, Chuan-gui Ma
2018 Security and Communication Networks  
Multifactor authentication protocols taking advantage of smart card, user's password, and biometric, are more secure than password-based single-factor authentication protocols which are widely used in  ...  In order to overcome the above weaknesses, we propose a novel multiserver multifactor authentication protocol based on the Kerberos protocol using the extended Chebyshev chaotic mapping as a cryptographic  ...  with 2 ( ) and V ( ) because of the hardness of the extended chaotic-map-based CDHP.  ... 
doi:10.1155/2018/5432960 fatcat:l5pxbmgfhbdpzmnrpl4nspzznq

Design of a Secure Dynamic Identity Authentication Scheme for Health Internet of Things

Chengqi Wang, Xiao Zhang, Lijia Xie, Zhiming Zheng
2017 International Journal of Security and Its Applications  
To address these issues, we propose a three-factor identity-based authenticated key agreement scheme, which is built upon extended chaotic maps. Our scheme improves Wang et al.'  ...  In particular, Wang et al. built an identity-based authentication scheme with extended Chebyshev chaotic maps.  ...  Conclusion This paper has proposed a robust three-factor identity-based authentication and key agreement scheme based on extended chaotic maps for health IoT.  ... 
doi:10.14257/ijsia.2017.11.9.04 fatcat:7wt72mnngjgarddykifwn4fxt4

Anonymity preserving and round effective three-party authentication key exchange protocol based on chaotic maps

Kyongsok Pak, Songho Pak, Cholman Ho, Myongsuk Pak, Choljin Hwang, Muhammad Khurram Khan
2019 PLoS ONE  
Since chaotic maps have superior characteristics, researchers have recently presented some of the studies that apply it to authentication key exchange and cryptography.  ...  Providing user anonymity in the authentication key exchange is one of the important security requirements to protect users' personal secrets. We analyse Lu et al.'  ...  But in this scheme, there is a risk of losing the smart card. In 2012, Lai et al. [53] proposed the implementation of the 3PAKE protocol to use smart card based on chaotic maps. However, Zhao et al.  ... 
doi:10.1371/journal.pone.0213976 pmid:30893354 pmcid:PMC6426243 fatcat:s5665eyfhffc3kzlwjbtvgeuvm

Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks

Tian-Fu Lee
2015 Sensors  
This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations  ...  The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key.  ...  Conflicts of Interest The authors declare no conflict of interest.  ... 
doi:10.3390/s150714960 pmid:26121612 pmcid:PMC4541817 fatcat:6y4kj56nvfcovco5s5yytx3i2a

Robust Biometrics-based Key Agreement Scheme with Smart Cards towards a New Architecture

Hongfeng Zhu, Man Jiang, Xin Hao, Yan Zhang
2015 Journal of Information Hiding and Multimedia Signal Processing  
Then a provably secure and robust biometrics-based Multiple Servers to Server authentication with key agreement scheme is presented using chaotic maps with smart cards.  ...  Security of the protocol is based on the computational infeasibility of solving Chaotic Maps-Based Discrete Logarithm problem (CMBDLP), Chaotic Maps-Based Diffie-Hellman problem (CMBDHP) and a secure symmetric  ...  These protocols using a chaotic map can mainly be divided into three categories based on the number of participants: two-party authenticated key agreement protocols [723], three-party authenticated key  ... 
dblp:journals/jihmsp/ZhuJHZ15 fatcat:zgtks2eu4ffl3ft546wuk6o5fa

A Privacy-Preserving Roaming Authentication Scheme for Ubiquitous Networks

You-sheng Zhou, Jun-feng Zhou, Feng Wang
2016 International Journal of Advanced Computer Science and Applications  
After that, the user and the foreign agent can establish a session key using the semi-group property of Chebyshev polynomial. In this way, huge burden of key management is avoided.  ...  Furthermore, the user can update the login password and the session key between itself and the foreign agent if necessary.  ...  ACKNOWLEDGEMENT This work was jointly supported by the National Social Science Foundation of China (no. 14CTQ026), the National Natural Science Foundation of China (no. 61472464), the  ... 
doi:10.14569/ijacsa.2016.070163 fatcat:gyuw4xqbsncolpcmui6e575bhy

Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials

Zuowen Tan, Ahmad Samer Wazan
2021 Security and Communication Networks  
s method, most of the secure chaotic maps-based key agreement protocols utilize the enhanced Chebyshev polynomials defined on the interval (−∞,+∞).  ...  Two-factor authentication is one of the widely used approaches to allow a user to keep a weak password and establish a key shared with a server.  ...  [38] proposed password-based key agreement protocol by using extended chaotic maps.  ... 
doi:10.1155/2021/6697898 fatcat:js4ufoeiobgz5aubbolja7otle

A Robust Three-Factor User Authentication Scheme based on Elliptic Curve Cryptography and Fuzzy Extractor
타원곡선 암호화와 퍼지 추출자를 이용한 강건한 삼중요소 사용자 인증 방식 연구

Trung Thanh Ngo, Tae-Young Choe
2019 Journal of KIISE  
We propose a robust three-factor authentication scheme entailing server smart cards, elliptic curve cryptography, and a fuzzy extractor that address the foregoing flaws and result in enhanced security.  ...  The scheme does not allow authentication in the absence of any of the three factors.  ...  Hwang, "Security enhancement for the timestamp-based password authentication scheme using smart cards," Computers & Security, Vol. 22, No. 7, pp. 591-595, 2003. [ 4 ] H.-M.  ... 
doi:10.5626/jok.2019.46.6.587 fatcat:wluqwcega5gohcpojbol3ofyti
« Previous Showing results 1 — 15 out of 412 results