A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Enhancing The Security of Chaotic Maps-based Password-Authenticated Key agreement Using Smart Card
2017
Journal of Information Hiding and Multimedia Signal Processing
Therefore, in this paper, we propose a secure chaotic maps-based password-authenticated key agreement using smart card. ...
Recently, Guo and Chang proposed a novel password-authentication key agreement (PAKA) using smart card, this protocol utilizes chaotic maps instead of modular exponentiation and scalar multiplication operation ...
This work is supported by the Liaoning Natural Science Foundation of China (Grant No. 2015020008) and Liaoning Provincial Natural Science Foundation of China (Grant No. 201602680). ...
dblp:journals/jihmsp/LinZ17
fatcat:lfuqzviburff5ng4zwcgwcmbrq
Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications
2013
Journal of Information Hiding and Multimedia Signal Processing
Inspired by the key-agreement protocols based on chaotic maps, we proposed a novel, chaotic maps-based authentication and key-agreement protocol using smart cards for wireless communications. ...
In recent years, most of the existing user authentication and key-agreement protocols with smart cards for wireless communications utilized modular exponential computing and scalar multiplication on elliptic ...
In this section, we propose a chaotic maps-based mutual authentication and key-agreement protocol for wireless communications using smart cards that almost satisfies all the requirements of the existing ...
dblp:journals/jihmsp/Guo0S13
fatcat:r3hi3clo4begpexqxdp7ppzl7e
Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map
2013
2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
This paper proposes a password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map. Properties of the proposed protocol are given below. ...
A password authenticated key exchange protocol can be used to authenticate user's legitimacy and establish a secure communication between a user and his logon server by using his friendly memorized password ...
This work was supported in part by National Science Council under the grants NSC 100-2628-H-182-001-MY3. ...
doi:10.1109/percomw.2013.6529462
dblp:conf/percom/HsuL13
fatcat:z4zfmjtnbbhr3cerabmhddg3yi
A New Authenticated Key Agreement Protocol based on Extended Chebyshev Maps
2017
Journal of Information Hiding and Multimedia Signal Processing
So we propose a new authenticated key agreement protocol based on Chebyshev maps and extended chotic maps under multi-server environment. ...
At last, we compare the new scheme to some other authenticated key agreement protocols, the experiment results show that our scheme has the efficiency and security. ...
This work is supported by Science & Technology Planning Project of Henan Province under Grant No. 152102210193. ...
dblp:journals/jihmsp/FanYL17
fatcat:i22gjdh7dbecbhdtqz4edxxqqe
The Cryptanalysis of Lee's Chaotic Maps-Based Authentication and Key Agreement Scheme using Smart card for Telecare Medicine Information Systems
[article]
2013
arXiv
pre-print
Lee also presented an efficient chaotic map-based password authentication and key agreement scheme using Smart cards for TMIS. ...
In 2013, Hao et al. presented chaotic maps-based password authentication scheme for TMIS. Recently, Lee identified that Hao et al.' ...
In recent times may chaotic map-based remote user authentication scheme [14, 16, 21, 22, 28] have been proposed to enhance the security of mutual authentication and session key agreement. ...
arXiv:1310.5896v1
fatcat:v2epq4pywjhw7apxswo3dvkl2m
An Improved Password Authentication Scheme for Telecare Medical Information Systems Based on Chaotic Maps with Privacy Protection
2016
Journal of Information Hiding and Multimedia Signal Processing
Recently, Lu et al. proposed a secure smart card based authentication scheme for TMISs using enhanced chaotic maps. ...
Chaos theory has been widely studied and adapted in cryptography for achieving some security mechanisms, such as encryption/decryption, key agreement and hash function. ...
Next, we further proposed a secure biometric based authentication scheme for TMISs using enhanced chaotic maps to conquer the security flaws. ...
dblp:journals/jihmsp/Sun16
fatcat:33g2uzzuwrbqrpu3ojlby242hu
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps
2017
PLoS ONE
Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide ...
This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. ...
Acknowledgments This research was supported by Ministry of Science and Technology under the grants MOST 105-2221-E-320-003 and by Tzu Chi University under the grants TCRPP105004. ...
doi:10.1371/journal.pone.0181744
pmid:28759615
pmcid:PMC5536435
fatcat:hwdkkozqircj3lgevrn2lb2vau
A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service
2018
Security and Communication Networks
Multifactor authentication protocols taking advantage of smart card, user's password, and biometric, are more secure than password-based single-factor authentication protocols which are widely used in ...
In order to overcome the above weaknesses, we propose a novel multiserver multifactor authentication protocol based on the Kerberos protocol using the extended Chebyshev chaotic mapping as a cryptographic ...
with 2 ( ) and V ( ) because of the hardness of the extended chaotic-map-based CDHP. ...
doi:10.1155/2018/5432960
fatcat:l5pxbmgfhbdpzmnrpl4nspzznq
Design of a Secure Dynamic Identity Authentication Scheme for Health Internet of Things
2017
International Journal of Security and Its Applications
To address these issues, we propose a three-factor identity-based authenticated key agreement scheme, which is built upon extended chaotic maps. Our scheme improves Wang et al.' ...
In particular, Wang et al. built an identity-based authentication scheme with extended Chebyshev chaotic maps. ...
Conclusion This paper has proposed a robust three-factor identity-based authentication and key agreement scheme based on extended chaotic maps for health IoT. ...
doi:10.14257/ijsia.2017.11.9.04
fatcat:7wt72mnngjgarddykifwn4fxt4
Anonymity preserving and round effective three-party authentication key exchange protocol based on chaotic maps
2019
PLoS ONE
Since chaotic maps have superior characteristics, researchers have recently presented some of the studies that apply it to authentication key exchange and cryptography. ...
Providing user anonymity in the authentication key exchange is one of the important security requirements to protect users' personal secrets. We analyse Lu et al.' ...
But in this scheme, there is a risk of losing the smart card. In 2012, Lai et al. [53] proposed the implementation of the 3PAKE protocol to use smart card based on chaotic maps. However, Zhao et al. ...
doi:10.1371/journal.pone.0213976
pmid:30893354
pmcid:PMC6426243
fatcat:s5665eyfhffc3kzlwjbtvgeuvm
Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks
2015
Sensors
This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations ...
The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. ...
Conflicts of Interest The authors declare no conflict of interest. ...
doi:10.3390/s150714960
pmid:26121612
pmcid:PMC4541817
fatcat:6y4kj56nvfcovco5s5yytx3i2a
Robust Biometrics-based Key Agreement Scheme with Smart Cards towards a New Architecture
2015
Journal of Information Hiding and Multimedia Signal Processing
Then a provably secure and robust biometrics-based Multiple Servers to Server authentication with key agreement scheme is presented using chaotic maps with smart cards. ...
Security of the protocol is based on the computational infeasibility of solving Chaotic Maps-Based Discrete Logarithm problem (CMBDLP), Chaotic Maps-Based Diffie-Hellman problem (CMBDHP) and a secure symmetric ...
These protocols using a chaotic map can mainly be divided into three categories based on the number of participants: two-party authenticated key agreement protocols [723], three-party authenticated key ...
dblp:journals/jihmsp/ZhuJHZ15
fatcat:zgtks2eu4ffl3ft546wuk6o5fa
A Privacy-Preserving Roaming Authentication Scheme for Ubiquitous Networks
2016
International Journal of Advanced Computer Science and Applications
After that, the user and the foreign agent can establish a session key using the semi-group property of Chebyshev polynomial. In this way, huge burden of key management is avoided. ...
Furthermore, the user can update the login password and the session key between itself and the foreign agent if necessary. ...
ACKNOWLEDGEMENT This work was jointly supported by the National Social Science Foundation of China (no. 14CTQ026), the National Natural Science Foundation of China (no. 61472464), the ...
doi:10.14569/ijacsa.2016.070163
fatcat:gyuw4xqbsncolpcmui6e575bhy
Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials
2021
Security and Communication Networks
s method, most of the secure chaotic maps-based key agreement protocols utilize the enhanced Chebyshev polynomials defined on the interval (−∞,+∞). ...
Two-factor authentication is one of the widely used approaches to allow a user to keep a weak password and establish a key shared with a server. ...
[38] proposed password-based key agreement protocol by using extended chaotic maps. ...
doi:10.1155/2021/6697898
fatcat:js4ufoeiobgz5aubbolja7otle
A Robust Three-Factor User Authentication Scheme based on Elliptic Curve Cryptography and Fuzzy Extractor
타원곡선 암호화와 퍼지 추출자를 이용한 강건한 삼중요소 사용자 인증 방식 연구
2019
Journal of KIISE
타원곡선 암호화와 퍼지 추출자를 이용한 강건한 삼중요소 사용자 인증 방식 연구
We propose a robust three-factor authentication scheme entailing server smart cards, elliptic curve cryptography, and a fuzzy extractor that address the foregoing flaws and result in enhanced security. ...
The scheme does not allow authentication in the absence of any of the three factors. ...
Hwang, "Security enhancement for the timestamp-based password authentication scheme using smart cards," Computers & Security, Vol. 22, No. 7, pp. 591-595, 2003. [ 4 ] H.-M. ...
doi:10.5626/jok.2019.46.6.587
fatcat:wluqwcega5gohcpojbol3ofyti
« Previous
Showing results 1 — 15 out of 412 results