2013
DOI: 10.1007/s11071-013-0772-4
|View full text |Cite
|
Sign up to set email alerts
|

A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
81
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 63 publications
(81 citation statements)
references
References 25 publications
0
81
0
Order By: Relevance
“…In this section, we first introduce the definitions and related char acteristics of chaotic maps [9,10]. Definition 1: Chebyshev polynomial, Tn(x), is a polynomial, where the integer, n denotes the degree of x, which is a variable within the interval [1, 1].…”
Section: Preliminariesmentioning
confidence: 99%
“…In this section, we first introduce the definitions and related char acteristics of chaotic maps [9,10]. Definition 1: Chebyshev polynomial, Tn(x), is a polynomial, where the integer, n denotes the degree of x, which is a variable within the interval [1, 1].…”
Section: Preliminariesmentioning
confidence: 99%
“…The Chebyshev polynomial includes two important features [6,11,14], which named the semigroup feature and the chaotic feature.…”
Section: Chebyshev Chaotic Mapsmentioning
confidence: 99%
“…For establishing a common session key between the data sender and the data receiver, they will exchange message confidentially with the authentication property over insecure communication networks [14,16,18,19]. Hence, in this paper, we will integrate methods of session key agreement and extended chaotic maps into our proposed keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage service.…”
Section: Introductionmentioning
confidence: 99%
“…Then, the service provider can ensure that the service can only be accessed by legitimate users; meanwhile, the user can believe that the service provider is legal. So far, there are many kinds of authentication scheme that are applicable to the user-server setting, such as certificate-based authentication scheme [1,2], identity-based authentication scheme [3][4][5], and passwordbased authentication scheme [6,7].…”
Section: Introductionmentioning
confidence: 99%