An efficient and secure two-party key agreement protocol based on chaotic maps

01/09/2018
by   Nahid Yahyapoor, et al.
0

Secure communication is a matter of genuine concern that includes means whereby entities can share information without a third party's interception. Key agreement protocols are one of the common approaches in which two or more parties can agree upon a key, which precludes undesired third parties from forcing a key choice on them. Over the past decade, chaos-based key agreement protocols have been studied and employed widely. Recently, Yoon and Jeon proposed a novel key agreement protocol based on chaotic maps and claimed security and practicality for their protocol. We find that Yoon-Jeon's protocol suffers certain issues: (1) It introduces a trusted third party whose very presence increases the implementation cost. (2) requires a multiplicity of encryption/decryption computations and (3) does not protect the user's anonymity. In order to overcome these problems, we present an enhanced key agreement protocol with user anonymity. Theoretical analysis demonstrates that the proposed protocol is efficient and resists current attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/03/2022

Security Analysis of Two Recent Pairing-Free Certificateless Two-Party Authenticated Key Agreement Protocols for Smart Grid

Smart grids are intelligent power transmission networks that monitor and...
research
12/05/2021

SCMCI: Secured Click and Mortar Commercial Interaction

The wide spread of click-and-mortar model offers an opportunity to consi...
research
06/21/2019

The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure

A recently proposed authenticated key agreement protocol is shown to be ...
research
05/05/2021

On the Communication Complexity of Key-Agreement Protocols

Key-agreement protocols whose security is proven in the random oracle mo...
research
06/16/2018

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

A semiquantum key distribution (SQKD) protocol makes it possible for a q...
research
09/10/2021

RandSolomon: optimally resilient multi-party random number generation protocol

Multi-party random number generation is a key building-block in many pra...
research
01/03/2019

Secure Two-Party Feature Selection

In this work, we study how to securely evaluate the value of trading dat...

Please sign up or login with your details

Forgot password? Click here to reset