2014
DOI: 10.1007/s11071-014-1388-z
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…A chaotic system is used to generate real number sequence for plaintext image subblock. ere are five commonly used chaotic systems, namely, logistic chaotic system, Chebyshev chaotic system, Skew Tent chaotic system, Henon chaotic system, and Lorenz chaotic system [19][20][21][22][23]. e description of the above five chaotic systems is as follows:…”
Section: Chaotic System Processingmentioning
confidence: 99%
“…A chaotic system is used to generate real number sequence for plaintext image subblock. ere are five commonly used chaotic systems, namely, logistic chaotic system, Chebyshev chaotic system, Skew Tent chaotic system, Henon chaotic system, and Lorenz chaotic system [19][20][21][22][23]. e description of the above five chaotic systems is as follows:…”
Section: Chaotic System Processingmentioning
confidence: 99%
“…Smart cards are not available in these protocols. We compare our protocol with Lai et al Farash et al's [31] 3T C + 4T H 3T C + 4T H 4T C + 4T H 10T C + 12T H 6 No No Lai et al's [30] 6T According to Ref. [20], the time cost of these operations implemented in the environment (CPU: 3.2 GHz, RAM 3.0 G) satisfies the following:…”
Section: Performance Analysismentioning
confidence: 99%
“…To handle this issue, many key agreement protocols in three-party settings have been developed. [25][26][27][28][29][30][31][32] In a three-party key agreement protocol, two users can authenticate each other and establish a session key with the aid of a trusted server. In this way, each user only needs to remember a password with the server, which eliminates the key management problems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Elliptic curves are also used in many environments to implement authentication, such as multi-server environment [22], agriculture monitoring environment [23], IOT environments [24], [25], medical information system environment [26], cloud computing environment [27]. Compared with other lightweight authentication schemes, Chebyshev chaotic maps have higher level of efficiency and security [1], [6], [18], [20], [28].…”
Section: Introductionmentioning
confidence: 99%