Chaotic map-based three-party authenticated key agreement
Article first published online: 28 JAN 2014
Copyright © 2014 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 7, Issue 12, pages 2469–2474, December 2014
How to Cite
2014), Chaotic map-based three-party authenticated key agreement, Security Comm. Networks, 7, 2469–2474, doi: 10.1002/sec.960(
- Issue published online: 27 NOV 2014
- Article first published online: 28 JAN 2014
- Manuscript Accepted: 2 DEC 2013
- Manuscript Revised: 15 OCT 2013
- Manuscript Received: 5 AUG 2013
- key agreement;
- Chebyshev polynomial
Three-party authenticated key exchange protocols are designed for facilitating secure communication between two users with the assistance of an authentication server. To achieve this purpose, encrypted key exchanges are commonly adopted mechanisms to generate a shared session key for both users. However, this approach usually utilizes the server's public key to encrypt communication messages and hence raises the issue of key management. Without executing time-consuming modular exponentiation, recently, chaos-based systems have been widely employed in many security protocols. In this paper, the author will propose a chaotic map-based three-party authenticated key agreement without using the server's public key. Additionally, the computational efficiency with related mechanisms is also demonstrated. Copyright © 2014 John Wiley & Sons, Ltd.