|
|
【答案】应助回帖
★ ★ ★ ★ ★ 感谢参与,应助指数 +1 zhuhf: 金币+5, ★★★★★最佳答案 2016-03-27 09:54:18 心静_依然: LS-EPI+1, 感谢应助 2016-03-27 10:08:27
Accession number:
20155201712893
Title:
A multi-server authenticated key agreement protocol with privacy preserving based on chaotic maps in random oracle model
Authors:
Zhu, Hongfeng1 ; Zhu, Dan2 ; Zhang, Yan3
Author affiliation:
1Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang, China
2School of Foreign Languages, Shenyang Jianzhu University, No.9, HunNan East Street, HunNan District, Shenyang, China
3Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang, China
Source title:
Journal of Information Hiding and Multimedia Signal Processing
Abbreviated source title:
J. Inf. Hiding Multimedia Signal Proces.
Volume:
7
Issue:
1
Issue date:
January 2016
Publication year:
2016
Pages:
59-71
Language:
English
ISSN:
20734212
E-ISSN:
20734239
Document type:
Journal article (JA)
Publisher:
Ubiquitous International
Abstract:
In the research literature, a typical authenticated key agreement protocol is designed to realize mutual authentication and key secrecy. In a network, as a crucial cryptographic primitive, key agreement can establish secure communication channels for communication entities. Meanwhile, the users privacy is particularity important, especially for multi-server authentication environment. Network privacy security means that the personal data and online data are not peep, intrusion, interference, illegal collection and utilization. In our paper, we propose a robust chaotic maps-based authentication key agreement scheme with privacy protection using smart cards for multi-server authentication environment. The key idea of our proposed scheme is to adopt chaotic maps for mutual authentication, not to encrypt/decrypt messages transferred between user and server, which can make our proposed scheme much more efficient. In addition, our protocol can realize the users privacy preserving and various common security features. As a whole, compared with other related protocol, our proposed protocol is more secure and practical. © 2016.
Number of references:
19
Main heading:
Data privacy
Controlled terms:
Authentication - Biometrics - Chaotic systems - Cryptography - Lyapunov methods - Network architecture - Network security - Public key cryptography - Smart cards - Transportation
Uncontrolled terms:
Authenticated key agreement protocols - Authentication key agreement - Chaotic map - Communication entities - Cryptographic primitives - Multi-server - Mutual authentication - Privacy preserving
Classification code:
461 Bioengineering and Biology - 722.4 Digital Computers and Systems - 723 Computer Software, Data Handling and Applications - 961 Systems Science
Database:
Compendex
Compilation and indexing terms, © 2016 Elsevier Inc.
Full-text and Local Holdings Links |
|