2019
DOI: 10.1371/journal.pone.0213976
|View full text |Cite
|
Sign up to set email alerts
|

Anonymity preserving and round effective three-party authentication key exchange protocol based on chaotic maps

Abstract: Three-party authentication key exchange (3PAKE) is a protocol that allows two users to set up a common session key with the help of a trusted remote server, which is effective for secret communication between clients in a large-scale network environment. Since chaotic maps have superior characteristics, researchers have recently presented some of the studies that apply it to authentication key exchange and cryptography. Providing user anonymity in the authentication key exchange is one of the important securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 59 publications
0
6
0
Order By: Relevance
“…In the past, several user authentication schemes have been proposed for the support of system efficiencies such as communication, computation, and storage. Specifically, in sensor technologies, the specific area of key agreement (KA) schemes [61][62][63][64][65][66][67][68] has often been chosen, though they are not suitable to provide better energy utilization and environment adaptability. In [69], the KA scheme is generally classified into traditional, physiological value, secret-key generation, and hybrid-key that tries to provide a secret session-key to authorize the data transmission between the real-time entities.…”
Section: Discussionmentioning
confidence: 99%
“…In the past, several user authentication schemes have been proposed for the support of system efficiencies such as communication, computation, and storage. Specifically, in sensor technologies, the specific area of key agreement (KA) schemes [61][62][63][64][65][66][67][68] has often been chosen, though they are not suitable to provide better energy utilization and environment adaptability. In [69], the KA scheme is generally classified into traditional, physiological value, secret-key generation, and hybrid-key that tries to provide a secret session-key to authorize the data transmission between the real-time entities.…”
Section: Discussionmentioning
confidence: 99%
“…Islam et al [30] protocol takes 0.00 s parseTime, communication steps 5, search time 0.66 s, depth plies 6, and the visited nodes 16. Pak et al [31] protocol consume parse time 0.00 s, communication steps 5, search time 8.94 s, depth plies 6 and visited nodes number 1690. After simulation, the proposed 3PAKE protocol offers parseTime 0.00 s, searchTime 0.12 s, depth of 4 plies, visited nodes 10, and communication steps 2 that shows all parameters are reduced from the existing protocols, therefore our suggested 3PAKE protocol provides very little computation complexity along with reduced search time for the client's authentication over the server S a .…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Then, a translator (HLPSL2IF) translates the HLPSL code into an intermediate format (IF). Then, the IF of the code will be verified through four different embedded verification tools: The On-the-Fly-Model-Checker (OFMC) [21], CL-Constraint-Logic-based model-checker (ATSE) [22], SAT-based Model-Checker (SATMC) [23], and Tree Automata based on automatic approximations (TA4SP) [24]. These embedded tools, check the security claims of the said IF code of an algorithm for two types of attack, i.e.…”
Section: Basics Of Avispamentioning
confidence: 99%