Design and Analysis of a Security-Enhanced Three-Party Authenticated Key Agreement Protocol Based on Chaotic Maps
A three-party authenticated key agreement (3PAKA) protocol allows two protocol entities to authenticate and agree on a common session key over common communication channels with the help of a trust server. Due to the better robustness and high computation efficiency, Chebyshev chaotic maps technolog...
Gespeichert in:
Veröffentlicht in: | IEEE access 2020, Vol.8, p.66150-66162 |
---|---|
Hauptverfasser: | , , , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A three-party authenticated key agreement (3PAKA) protocol allows two protocol entities to authenticate and agree on a common session key over common communication channels with the help of a trust server. Due to the better robustness and high computation efficiency, Chebyshev chaotic maps technology has been widely used in the authenticated key agreement protocol. In recent years, many researches of the 3PAKA protocol based on Chebyshev chaotic maps have been well-documented. However, cryptanalysis of previous schemes showcased that existing 3PAKA protocols commonly could not resist known session specific temporary attack and could not guarantee users anonymity. In addition, they assumed that the communication channels were absolutely secure during the registration process, which is impracticable in major applications. To overcome the existing weaknesses, we propose a security-enhanced protocol. Finally yet importantly, the security of our proposed scheme has been validated with Strand Space technology and ProVerif tool. Contrary to the existing schemes, the proposed protocol showcased improved security with lower computation and communication cost. |
---|---|
ISSN: | 2169-3536 2169-3536 |
DOI: | 10.1109/ACCESS.2020.2979251 |