Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps.
Recently, Lu et al. claimed that Xie et al.'s three-party password-authenticated key agreement protocol (3PAKA) using chaotic maps has three security vulnerabilities; in particular, it cannot resist offline password guessing attack, Bergamo et al.'s attack and impersonation attack, and the...
Main Authors: | Qi Xie, Yanrong Lu, Xiao Tan, Zhixiong Tang, Bin Hu |
---|---|
Format: | Article |
Language: | English |
Published: |
Public Library of Science (PLoS)
2018-01-01
|
Series: | PLoS ONE |
Online Access: | http://europepmc.org/articles/PMC6173389?pdf=render |
Similar Items
-
An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity.
by: Yanrong Lu, et al.
Published: (2016-01-01) -
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.
by: Tian-Fu Lee, et al.
Published: (2017-01-01) -
Anonymous three-party password-authenticated key exchange scheme for Telecare Medical Information Systems.
by: Qi Xie, et al.
Published: (2014-01-01) -
Anonymous Identity-based Authenticated Key Agreements Using Extended Chaotic Maps for HIPAA Privacy / Security Regulations
by: Haung,Yi-Chien, et al.
Published: (2017) -
The password authentication for the three-party key agreement protocol
by: Hsing-Chuan Lin, et al.
Published: (2016)