Volume 30 Issue 4
Jul.  2021
Turn off MathJax
Article Contents
QIAO Hui, DONG Xuewen, SHEN Yulong, et al., “TAKAP: A Lightweight Three-Party Authenticated Key Agreement Protocol with User Anonymity,” Chinese Journal of Electronics, vol. 30, no. 4, pp. 686-696, 2021, doi: 10.1049/cje.2021.05.010
Citation: QIAO Hui, DONG Xuewen, SHEN Yulong, et al., “TAKAP: A Lightweight Three-Party Authenticated Key Agreement Protocol with User Anonymity,” Chinese Journal of Electronics, vol. 30, no. 4, pp. 686-696, 2021, doi: 10.1049/cje.2021.05.010

TAKAP: A Lightweight Three-Party Authenticated Key Agreement Protocol with User Anonymity

doi: 10.1049/cje.2021.05.010
Funds:

This work is supported by the National Key Research and Development Plan of China (No.2020YFB1005500), the Natural Science Foundation of China (No.61972310, No.61972017, No.62072487), and Key Research and Development Program of Shaanxi Province (No.2019ZDLGY12-03, No.2019ZDLGY13-06).

  • Received Date: 2019-09-25
    Available Online: 2021-07-19
  • Publish Date: 2021-07-05
  • The three-party authenticated key agreement protocol is a significant cryptographic mechanism for secure communication, which encourages two entities to authenticate each other and generate a shared session key with the assistance of a trusted party (remote server) via a public channel. Recently, Wang et al. put forward a three-party key agreement protocol with user anonymity and alleged that their protocol is able to resist all kinds of attacks and provide multifarious security features in Computer Engineering & Science, No.3, 2018. Unfortunately, we show that Wang et al.’s protocol is vulnerable to the password guessing attack and fails to satisfy user anonymity and perfect secrecy. To solve the aforementioned problems, a lightweight chaotic map-based Three-party authenticated key agreement protocol (short for TAKAP) is proposed, which not only could provide privacy protection but also resist a wide variety of security attacks. Furthermore, it is formally proved under Burrows-Abadi-Needham (BAN) logic. Simultaneously, the performance analysis in this paper demonstrates that the proposed TAKAP protocol is more secure and efficient compared with other relevant protocols.

  • loading
  • J. Katz, R. Ostrovsky and M. Yung, "Efficient password-authenticated key exchange using human-memorable passwords", Proc. of International Conference on the Theory and Applications of Cryptographic Techniques, Innsbruck, Austria, pp.475-494, 2001.
    M. D. Raimondo and R. Gennaro, "Provably secure threshold password authenticated key exchange", Journal of Computer & System Sciences, Vol.72, No.6, pp.978-1001, 2003.
    C. Guo and C. C. Chang, "Chaotic maps-based password-authenticated key agreement using smart cards", Communications in Nonlinear Science & Numerical Simulation, Vol.18, No.6, pp.1433-1440, 2013.
    M. Chen, "Strongly secure and anonymous two-party authenticated key agreement for mobile roaming service", Acta Electronica Sinica, Vol.47, No.1, pp.16-24, 2019. (in Chinese)
    X. L. Li, W. Li and J. T. Gao, "A mutual authentication and key agreement protocol with multi-registration center", Acta Electronica Sinica, Vol.46, No.10, pp.2418-2422, 2018. (in Chinese)
    Z. Tan, "A chaotic maps-based authenticated key agreement protocol with strong anonymity", Nonlinear Dynamics, Vol.72, No.1-2, pp.311-320, 2013.
    H. Lai, J. Xiao and L. Li, "Applying semigroup property of enhanced chebyshev polynomials to anonymous authentication protocol", Mathematical Problems in Engineering, Vol.2012. DOI:10.1155/2012/454823, 2012.
    E. J. Yoon, "Efficiency and security problems of anonymous key agreement protocol based on chaotic maps", Communications in Nonlinear Science & Numerical Simulation, Vol.17, No.7, pp.2735-2740, 2012.
    F. Zhao, G. Peng, L. Shuai, et al., "Cryptanalysis and improvement of a three-party key agreement protocol using enhanced chebyshev polynomials", Nonlinear Dynamics, Vol.74, No.1-2, pp.419-427, 2013.
    H. Lin, "Chaotic map-based three-party authenticated key agreement", Security & Communication Networks, Vol.7, No.12, pp.2469-2474, 2015.
    X. Li, F. Wu and J. G. Liao, "Efficient three-party authenticated key agreement protocol based on chaotic map", Chinese Journal of Network & Information Security, Vol.2, No.06, pp.13-21, 2016. (in Chinese)
    C. F. Wang, C. Li, C. Liu, et al., "A three-party password authentication key agreement schemes based on chaotic maps with user anonymity", Computer Engineering & Science, Vol.40, No.03, pp.445-455, 2018.
    X. Di, X. Liao and S. Deng, "A novel key agreement protocol based on chaotic maps", Information Sciences, Vol.177, No.4, pp.1136-1142, 2007.
    S. Han, "Security of a key agreement protocol based on chaotic maps", Chaos, Solitons & Fractals, Vol.38, No.3, pp.764-768, 2008.
    X. Di, X. Liao and S. Deng, "Using time-stamp to improve the security of a chaotic maps-based key agreement protocol", Information Sciences, Vol.178, No.6, pp.1598-1602, 2008.
    H. R. Tseng, R. H. Jan and W. Yang, "A chaotic maps-based key agreement protocol that preserves user anonymity", in Proc. of IEEE International Conference on Communications, Dresden, Germany, pp.1-6, 2009.
    Y. Niu and X. Wang, "An anonymous key agreement protocol based on chaotic maps", Communications in Nonlinear Science and Numerical Simulation, Vol.16, No.4, pp.1986-1992, 2011.
    K. Xue and P. Hong, "Security improvement on an anonymous key agreement protocol based on chaotic maps", Communications in Nonlinear Science & Numerical Simulation, Vol.17, No.7, pp.2969-2977, 2012.
    D. He, Y. Chen and J. Chen, "Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol", Nonlinear Dynamics, Vol.69, No.3, pp.1149-1157, 2012.
    T. F. Lee, "Enhancing the security of password authenticated key agreement protocols based on chaotic maps", Information Sciences, Vol.290, pp.63-71, DOI:10.1016/j.ins.2014.08.041, 2015.
    C. F. Wang, H. Qiao, Y. Li, et al., "Improved three-factor authenticated key agreement scheme", Application Research of Computers, Vol.35, No.02, pp.536-541, 2018. (in Chinese)
    M. Ma, D. He, H. Wang, et al., "An efficient and provably-secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks", IEEE Internet of Things Journal, Vol.6, No.5, pp.8065-8075, 2019.
    B. L. Parne, S. Gupta and N. S. Chaudhari, "Pseaka:Performance and security enhanced authentication key agreement protocol for iot enabled LTE/LTE-A networks", Peer-to-Peer Networking and Applications, Vol.12, No.5, pp.1156-1177, 2019.
    S. W. Wang and J. H. Chen, "Chaotic mapping asynchronous authentication key agreement scheme with smart-cards", Computer Science, Vol.46, No.4, pp.182-188, 2019.
    W. F. Zhang, L. T. Lei, X. M. Wang, et al., "Secure and efficient authentication and key agreement protocol using certificateless aggregate signature for cloud service oriented VANET", Acta Electronica Sinica, Vol.48, No.09, pp.1814-1823, 2020. (in Chinese)
    X. T. Ma, W. P. Ma and X. X. Liu, "A cross domain authentication scheme based on blockchain technology", Acta Electronica Sinica, Vol.46, No.11, pp.2571-2579, 2018. (in Chinese)
    W. D. Fang, W. X. Zhang, Y. Yang, et al., "BTh-UAP:Biometric-based three-factor user authentication protocol for wireless sensor network", Acta Electronica Sinica, Vol.46, No.03, pp.702-713, 2018. (in Chinese)
    Q. Jiang, N. Zhang, J. B. Ni, et al., "Unified biometric privacy preserving phree-factor authentication and key agreement for cloud-assisted autonomous vehicles", IEEE Transactions on Vehicular Technology, Vol.69, No.9, pp.9390-9401, 2020.
    Q. Jiang, Z. R. Chen, J. F. Ma, et al., "Optimized fuzzy commitment based key agreement protocol for wireless body area network", IEEE Transactions on Emerging Topics in Computing, Vol.PP, No.99, pp.1-1, 2019. DOI: 10.1109/TETC.2019.2949137.
    H. Qiao, X. W. Dong and Y. L. Shen, "Authenticated key agreement scheme with strong anonymity for multi-server environment in TMIS", Journal of Medical Systems, Vol.43, No.11, pp.321:1-321:13, 2019.
    L. Zhang, "Cryptanalysis of the public key encryption based on multiple chaotic systems", Chaos, Solitons & Fractals, Vol.37, No.3, pp.669-674, 2008.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (486) PDF downloads(9) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return