Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps.

Recently, Lu et al. claimed that Xie et al.'s three-party password-authenticated key agreement protocol (3PAKA) using chaotic maps has three security vulnerabilities; in particular, it cannot resist offline password guessing attack, Bergamo et al.'s attack and impersonation attack, and the...

Full description

Bibliographic Details
Main Authors: Qi Xie, Yanrong Lu, Xiao Tan, Zhixiong Tang, Bin Hu
Format: Article
Language:English
Published: Public Library of Science (PLoS) 2018-01-01
Series:PLoS ONE
Online Access:http://europepmc.org/articles/PMC6173389?pdf=render