Skip to main content
Log in

A new three-party-authenticated key agreement scheme based on chaotic maps without password table

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Three-party-authenticated key agreement allows two users to establish a common session key through a trusted server via an insecure communication channel. Early authenticated key agreement schemes were mostly based on either pairing operations, hash operations, or modular exponentiation operations. In 2011, Wang and Zhao took a new path and built their three-party-authenticated key agreement scheme on the basis of chaotic maps. By applying Chebyshev chaotic maps, Wang and Zhao succeeded in lifting their scheme up to a higher level of efficiency and security. In this paper, we shall propose a new three-party-authenticated key agreement scheme based on chaotic maps that can do without passwords. Keeping no password table, our new scheme is completely resistant to password guessing attacks. Besides that, our scheme also offers thorough privacy protection to the users, so the user forgery attack can cause no damage. Compared with the schemes currently available including Wang and Zhao’s work, our new scheme obviously provides better security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)

    Article  Google Scholar 

  2. Farash, M.S., Attari, M.A.: An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn. (2014). doi:10.1007/s11071-014-1304-6

  3. Farash, M.S., Attari, M.A.: An enhanced authenticated key agreement for session initiation protocol. Inf. Technol. Control 42(4), 333–342 (2013)

    Google Scholar 

  4. Farash, M.S., Attari, M.A.: A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. J. Supercomput. (2014). doi:10.1007/s11227-014-1170-5

  5. Farash, M.S., Attari, M.A.: An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards. Int. J. Commun. Syst. (2014). doi:10.1002/dac.2848

  6. Farash, M.S., Attari, M.A.: An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int. J. Commun. Syst. (2014). doi:10.1002/dac.2879

  7. Farash, M.S., Attari, M.A.: An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems. Inf. Technol. Control 43(2), 143–150 (2014)

    MathSciNet  Google Scholar 

  8. Farash, M.S., Attari, M.A.: An efficient client-client password-based authentication scheme with provable security. J. Supercomput. (2014). doi:10.1007/s11227-014-1273-z

  9. Guo, C., Chang, C.C.: Chaotic maps-based password authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6), 1433–1440 (2012)

    Article  MathSciNet  Google Scholar 

  10. Lai, H., Xiao, J., Li, L., Yang, Y.: Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol. Math. Probl. Eng. 2012, 17 (2012)

    Article  MathSciNet  Google Scholar 

  11. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  12. Lee, C.C., Lou, D., Li, C.T., Hsu, C.W.: An extended chaotic-maps-based protocol with key agreement for multi-server environments. Nonlinear Dyn. 76(1), 853–866 (2014)

    Article  MathSciNet  Google Scholar 

  13. Lee, C.C., Li, C.T., Hsu, C.W.: A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn. 73(1), 125–132 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  14. Lee, C.C.: A simple key agreement scheme based on chaotic maps for VSAT satellite communications. Int. J. Satell. Commun. Netw. 31(4), 177–186 (2013)

    Article  Google Scholar 

  15. Lee, C.C., Hsu, C.W.: A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1), 201–211 (2013)

    Article  MathSciNet  Google Scholar 

  16. Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1), 79–87 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  17. Lee, C.C., Chen, S.D., Chen, C.L.: A computation-efficient three-party encrypted key exchange protocol. Appl. Math. Inf. Sci. 6(3), 573–579 (2012)

    MathSciNet  Google Scholar 

  18. Lee, C.C., Li, C.T., Chang, R.X.: An undetectable on-line password guessing attack on Nam et al’.s three-party key exchange protocol. J. Comput. Methods Sci. Eng. 13(5–6), 455–460 (2013)

    MathSciNet  Google Scholar 

  19. Mason, J.C., Handscomb, D.C.: Chebyshev Polynomials. Chapman & Hall/CRC Press, London (2003)

    MATH  Google Scholar 

  20. Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986–1992 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  21. Tseng, H., Jan, R., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International Conference on Communications, pp. 1–6 (2009)

  22. Wang, X., Zhao, J.: An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(12), 4052–4057 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  23. Wessels, J.: Application of BAN-logic. CMG Financ. B.V., pp. 1–22 (2001)

  24. Xie, Q., Zhao, J., Yu, X.: Chaotic maps-based three-party password-authenticated key agreement scheme. Nonlinear Dyn. 74(4), 1021–1027 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  25. Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969–2977 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  26. Yoon, E.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2735–2740 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  27. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fract. 37(3), 669–674 (2008)

    Article  MATH  Google Scholar 

  28. Zhao, F., Gong, P., Li, S., Li, M., Li, P.: Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials. Nonlinear Dyn. 74(1–2), 419–427 (2013)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Acknowledgments

The authors would like to express their appreciation to the anonymous referees for their valuable suggestions and comments. This research was partially supported by the National Science Council, Taiwan, R.O.C., under Contract No.: NSC102-2221-E-030-003.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chun-Ta Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, CC., Li, CT., Chiu, ST. et al. A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 79, 2485–2495 (2015). https://doi.org/10.1007/s11071-014-1827-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-014-1827-x

Keywords

Navigation