|
|
【答案】应助回帖
★ ★ ★ ★ ★ ★ 感谢参与,应助指数 +1 zhuhf: 金币+6, ★★★★★最佳答案 2016-03-28 15:28:39 lazy锦溪: LS-EPI+1, 感谢应助! 2016-03-28 16:54:15
ccession number:
20154701571362
Title: Password-authenticated key exchange scheme using chaotic maps towards a new architecture in standard model
Authors: Zhu, Hongfeng1 Email author zhuhongfeng1978.163.com@qq.com; Zhang, Yifeng1; Xia, Yu1; Li, Haiyang1
Author affiliation: 1 Software College, Shenyang Normal University, no. 253, HuangHe Bei Street, HuangGu District, Shenyang, China
Corresponding author: Zhu, Hongfeng (zhuhongfeng1978.163.com@qq.com)
Source title: International Journal of Network Security
Abbreviated source title: Int. J. Netw. Secur.
Volume: 18
Issue: 2
Issue date: 2016
Publication year: 2016
Pages: 326-334
Language: English
ISSN: 1816353X
E-ISSN: 18163548
Document type: Journal article (JA)
Publisher: Femto Technique Co., Ltd.
Abstract: Nowadays, the overwhelming majority of password-authenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four security models (heuristic security, random oracle, ideal cipher and standard model). However, with rapid changes in the modern communication environment such as wireless mesh networks and cloud storing, it is necessary to put forward a kind more flexible and general architecture to adapt it. So, in our paper, we firstly propose a provable secure password authenticated key agreement protocol using chaotic maps towards multiple servers to server architecture in the standard model. The multiple servers to server architecture will solve the problems single-point of security, single-point of efficiency and single-point of failure in the centralized registration center towards multi-server architecture. The new protocol resists dictionary attacks mounted by either passive or active network intruders, allowing, in principle, even weak password phrases to be used safely. It also offers perfect forward secrecy, which protects past sessions and passwords against future compromises. Finally, we give the security proof in the standard model and the efficiency analysis of our proposed scheme.
Number of references: 25
Main heading: Network architecture
Controlled terms: Authentication - Chaotic systems - Cryptography - Efficiency - Lyapunov methods - MESH networking - Public key cryptography
Uncontrolled terms: Chaotic map - Communication environments - Key exchange - Multi-server architecture - Multiple servers - Mutual authentication - Password-authenticated key agreement - Password-authenticated key exchange
Classification code: 722 Computer Systems and Equipment - 723 Computer Software, Data Handling and Applications - 913.1 Production Engineering - 961 Systems Science
Database: Compendex
Compilation and indexing terms, © 2016 Elsevier Inc. |
|