2014
DOI: 10.1007/s11071-014-1304-6
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
71
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
9

Relationship

3
6

Authors

Journals

citations
Cited by 96 publications
(71 citation statements)
references
References 30 publications
0
71
0
Order By: Relevance
“…Our protocol is a secure scheme providing 3PAKA and data exchange in medical environment, and the computation and communication loadings for providing only 3PAKA (without data exchange) in our scheme are different (lesser). In Table 4 Tso's scheme [12] Farash and Attari's scheme [13] Deebak et al 's scheme [14] Our scheme E x p o n e n t i a t i o n [14], each IP multimedia system (IMS) client enters his/her credentials into the registration form to avail the multimedia services, like video, voice, and data, and subsequently, the IMS server executes some steps to verify whether the client authorization is success or not. Moreover, each client has to perform two hash and two XOR functions in the logon phase, and the server has to perform four inverse computations in the authentication phase.…”
Section: Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…Our protocol is a secure scheme providing 3PAKA and data exchange in medical environment, and the computation and communication loadings for providing only 3PAKA (without data exchange) in our scheme are different (lesser). In Table 4 Tso's scheme [12] Farash and Attari's scheme [13] Deebak et al 's scheme [14] Our scheme E x p o n e n t i a t i o n [14], each IP multimedia system (IMS) client enters his/her credentials into the registration form to avail the multimedia services, like video, voice, and data, and subsequently, the IMS server executes some steps to verify whether the client authorization is success or not. Moreover, each client has to perform two hash and two XOR functions in the logon phase, and the server has to perform four inverse computations in the authentication phase.…”
Section: Comparisonmentioning
confidence: 99%
“…The schemes [15,16] are smart card based schemes and some of their security and efficiency are based on smart cards. The properties "resistance to verifier-stolen attacks" of the schemes [11][12][13]17] are all "N/A" because they are password-based schemes without verifiers. From Tables 3-6, our scheme is superior to previous RSA-based and other recently published 3PAKA schemes in terms of security and computation and communication performance.…”
Section: Comparisonmentioning
confidence: 99%
“…Chebyshev polynomials are employed in various cryptographic schemes including key agreement protocols [26,34], password-based authentication schemes [16,20], public key encryption schemes [37,8], and RFID authentication protocols [11,6,3]. The implementation of Chebyshev polynomials uses small resources so that smart cards and RFID tags can utilize them.…”
Section: Theorem 5 Our Protocol Satisfies Forward Privacy Given That mentioning
confidence: 99%
“…For this reason, three-party password-based authenticated key exchange (3PAKE for short) has been described. Various 3PAKE protocols have been proposed [10,11,12,13,14,15,16]. In 2013, Xie et al proposed a 3PAKE protocol based on chaotic maps [16].…”
Section: Introductionmentioning
confidence: 99%