Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
Recently, several key agreement protocols based on Chebyshev chaotic maps have been proposed in the literature. However, they can normally achieve “heuristic” security, that is, once drawbacks are found in these protocols, they are either modified to resist the new attacks, or are discarded. Under t...
Saved in:
Published in | Nonlinear dynamics Vol. 77; no. 4; pp. 1427 - 1439 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Dordrecht
Springer Netherlands
01.09.2014
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Recently, several key agreement protocols based on Chebyshev chaotic maps have been proposed in the literature. However, they can normally achieve “heuristic” security, that is, once drawbacks are found in these protocols, they are either modified to resist the new attacks, or are discarded. Under these circumstances, it is necessary and significant to define standard security models that can precisely characterize the capabilities of the participants and a potent adversary. Hence, we propose to use public key encryption based on enhanced Chebyshev chaotic maps and pseudo-random function ensembles to construct an efficient three-party key agreement protocol under the standard model, in which the adversary is able to make a wider range of queries and have more freedom than the other proposed schemes. In the design of our protocol, we follow the ideas in the recent key agreement protocol of Yang and Cao’s. The proposed protocol is shown to be provably secure if decisional Diffie–Hellman problem, which is based on Chebyshev chaotic maps, is computationally infeasible. To the best of our knowledge, our protocol is the first provably secure 3PAKE protocol using Chebyshev chaotic maps under the standard model. |
---|---|
AbstractList | Recently, several key agreement protocols based on Chebyshev chaotic maps have been proposed in the literature. However, they can normally achieve “heuristic” security, that is, once drawbacks are found in these protocols, they are either modified to resist the new attacks, or are discarded. Under these circumstances, it is necessary and significant to define standard security models that can precisely characterize the capabilities of the participants and a potent adversary. Hence, we propose to use public key encryption based on enhanced Chebyshev chaotic maps and pseudo-random function ensembles to construct an efficient three-party key agreement protocol under the standard model, in which the adversary is able to make a wider range of queries and have more freedom than the other proposed schemes. In the design of our protocol, we follow the ideas in the recent key agreement protocol of Yang and Cao’s. The proposed protocol is shown to be provably secure if decisional Diffie–Hellman problem, which is based on Chebyshev chaotic maps, is computationally infeasible. To the best of our knowledge, our protocol is the first provably secure 3PAKE protocol using Chebyshev chaotic maps under the standard model. |
Author | Yang, Yixian Orgun, Mehmet A. Xiao, Jinghua Pieprzyk, Josef Lai, Hong Xue, Liyin |
Author_xml | – sequence: 1 givenname: Hong surname: Lai fullname: Lai, Hong email: hong.lai@students.mq.edu.au organization: School of Science, Beijing University of Posts and Telecommunications, Department of Computing, Macquarie University – sequence: 2 givenname: Mehmet A. surname: Orgun fullname: Orgun, Mehmet A. organization: Department of Computing, Macquarie University – sequence: 3 givenname: Jinghua surname: Xiao fullname: Xiao, Jinghua organization: School of Science, Beijing University of Posts and Telecommunications – sequence: 4 givenname: Josef surname: Pieprzyk fullname: Pieprzyk, Josef organization: Department of Computing, Macquarie University – sequence: 5 givenname: Liyin surname: Xue fullname: Xue, Liyin organization: Corporate Analytics The Australian Taxation Office – sequence: 6 givenname: Yixian surname: Yang fullname: Yang, Yixian organization: Information Security Center, Beijing University of Posts and Telecommunications |
BookMark | eNp9kE9LJDEQxYMoOP75AN4CnrNWkm7TfZRhVwVh97CCt5BkKjOtPcmYZISeT29kBGHBPRVFvd-rxzshhyEGJOSCww8OoK4y56A4A94wLruO7Q7IjLdKMnHdPx2SGfSiYdDD0zE5yfkZAKSAbkbwT4pvxo4Tzei2CWlZJUS2MalM9AUnapZ1X2ModJNiiS6OdJuHsKTzFdopr_CNupWJZXB0bTaZDqFaIM3FhIVJC7qOCxzPyJE3Y8bzz3lKHn_9_Du_Yw-_b-_nNw_MyU4UZlCAVF6Bc0Io3juF1nWqEZ6DtMpLa41obAvWSw-tbb3l3PMWr-vZoZGn5HLvW7O-bjEX_Ry3KdSXWoi2byS0oqsqtVe5FHNO6LUbiilDDCWZYdQc9Eenet-prp3qj071rpL8H3KThrVJ038ZsWdy1YYlpq9M30PvV9GN8A |
CitedBy_id | crossref_primary_10_1007_s11071_021_06898_y crossref_primary_10_1007_s11071_015_2580_5 crossref_primary_10_1109_ACCESS_2020_2979251 crossref_primary_10_1109_ACCESS_2024_3375343 crossref_primary_10_1109_ACCESS_2023_3325886 crossref_primary_10_1007_s11227_024_06467_1 crossref_primary_10_1007_s11277_017_4902_z crossref_primary_10_1007_s11071_015_2506_2 crossref_primary_10_1007_s11042_022_13078_6 crossref_primary_10_1371_journal_pone_0213976 crossref_primary_10_1038_s41598_025_89208_5 crossref_primary_10_1088_1674_1056_24_11_110505 crossref_primary_10_1007_s11071_015_2467_5 crossref_primary_10_1007_s11071_018_04748_y crossref_primary_10_1155_2022_4260804 crossref_primary_10_1109_ACCESS_2020_2979906 crossref_primary_10_1007_s10623_025_01574_3 crossref_primary_10_1007_s10586_023_04232_2 crossref_primary_10_1007_s11071_014_1816_0 crossref_primary_10_1002_cpe_4523 crossref_primary_10_3390_a17090389 |
Cites_doi | 10.1007/s11071-011-0247-4 10.1016/j.mcm.2011.10.001 10.1016/j.jss.2011.08.024 10.1016/j.ins.2010.09.032 10.1007/s11071-013-1029-y 10.1016/j.chaos.2007.01.017 10.1016/j.chaos.2006.09.047 10.1016/j.ins.2011.07.015 10.1007/s11071-013-1020-7 10.1016/j.chaos.2007.08.012 10.1007/s11071-012-0335-0 10.1007/s11071-012-0715-5 10.1142/S0218127406015970 10.1016/j.cnsns.2010.09.021 10.1007/s11071-013-0979-4 10.1007/s11071-012-0652-3 10.1103/PhysRevLett.95.098702 10.1007/s11071-012-0628-3 10.1016/j.ins.2006.07.026 10.1007/s11071-013-0772-4 10.1016/j.ins.2011.05.009 10.1016/j.cnsns.2010.02.014 10.1007/3-540-45682-1_18 10.1109/ICC.2009.5198581 10.1007/3-540-45539-6_12 10.1109/TIT.1976.1055638 10.1145/502014.502018 10.1109/ISCAS.2003.1204947 10.1007/11935230_22 10.1017/CBO9780511546891 10.1007/978-3-540-70500-0_6 |
ContentType | Journal Article |
Copyright | Springer Science+Business Media Dordrecht 2014 Nonlinear Dynamics is a copyright of Springer, (2014). All Rights Reserved. |
Copyright_xml | – notice: Springer Science+Business Media Dordrecht 2014 – notice: Nonlinear Dynamics is a copyright of Springer, (2014). All Rights Reserved. |
DBID | AAYXX CITATION 8FE 8FG ABJCF AFKRA BENPR BGLVJ CCPQU DWQXO HCIFZ L6V M7S PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS |
DOI | 10.1007/s11071-014-1388-z |
DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland ProQuest Central ProQuest Technology Collection ProQuest One Community College ProQuest Central Korea SciTech Premium Collection ProQuest Engineering Collection Engineering Database ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering collection |
DatabaseTitle | CrossRef Engineering Database Technology Collection ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest One Academic UKI Edition ProQuest Central Korea Materials Science & Engineering Collection ProQuest One Academic ProQuest Central (New) Engineering Collection ProQuest One Academic (New) |
DatabaseTitleList | Engineering Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Applied Sciences Engineering |
EISSN | 1573-269X |
EndPage | 1439 |
ExternalDocumentID | 10_1007_s11071_014_1388_z |
GroupedDBID | -5B -5G -BR -EM -Y2 -~C -~X .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29N 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 8FE 8FG 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJCF ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFFNX AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARCEE ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG F5P FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW L6V LAK LLZTM M4Y M7S MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P9T PF0 PT4 PT5 PTHSS QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCV SDH SDM SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WH7 WK8 YLTOR Z45 Z5O Z7R Z7S Z7X Z7Y Z7Z Z83 Z86 Z88 Z8M Z8N Z8R Z8S Z8T Z8W Z8Z Z92 ZMTXR _50 ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP AMVHM ATHPR AYFIA CITATION PHGZM PHGZT PQGLB DWQXO PKEHL PQEST PQQKQ PQUKI PRINS |
ID | FETCH-LOGICAL-c382t-ae2037f70cc22719c7ebc8742f103b7f3bba24b50bf3f05b5fb11f15e603bcea3 |
IEDL.DBID | BENPR |
ISSN | 0924-090X |
IngestDate | Fri Jul 25 11:11:38 EDT 2025 Tue Aug 05 12:02:02 EDT 2025 Thu Apr 24 23:06:40 EDT 2025 Fri Feb 21 02:33:57 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Keywords | Standard model Heuristic security Enhanced Chebyshev chaotic maps Pseudo-random function ensembles Decisional Diffie–Hellman |
Language | English |
License | http://www.springer.com/tdm |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c382t-ae2037f70cc22719c7ebc8742f103b7f3bba24b50bf3f05b5fb11f15e603bcea3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2259430528 |
PQPubID | 2043746 |
PageCount | 13 |
ParticipantIDs | proquest_journals_2259430528 crossref_citationtrail_10_1007_s11071_014_1388_z crossref_primary_10_1007_s11071_014_1388_z springer_journals_10_1007_s11071_014_1388_z |
PublicationCentury | 2000 |
PublicationDate | 2014-09-01 |
PublicationDateYYYYMMDD | 2014-09-01 |
PublicationDate_xml | – month: 09 year: 2014 text: 2014-09-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Dordrecht |
PublicationPlace_xml | – name: Dordrecht |
PublicationSubtitle | An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems |
PublicationTitle | Nonlinear dynamics |
PublicationTitleAbbrev | Nonlinear Dyn |
PublicationYear | 2014 |
Publisher | Springer Netherlands Springer Nature B.V |
Publisher_xml | – name: Springer Netherlands – name: Springer Nature B.V |
References | James (CR30) 1975 Alvarez, Li (CR1) 2006; 16 Lee, Li, Hsu (CR13) 2013; 73 CR19 Xiao, Liao, Deng (CR2) 2007; 177 CR18 CR35 CR34 Zhao, Gu (CR25) 2012; 184 Xiang, Wong, Liao (CR4) 2009; 40 Wang, Zhao (CR11) 2010; 15 Li, Lee, Weng (CR12) 2013; 74 Zhao, Gong, Li, Li, Li (CR15) 2013; 74 Guo, li, Mu, Zhang (CR24) 2011; 181 Xiong, Chen, Li (CR26) 2012; 55 Bose (CR33) 2005; 95 Lee, Hsu (CR14) 2013; 71 Jiang, Peng (CR31) 1996; 19 He, Chen, Chen (CR7) 2012; 69 Xie, Zhao, Yu (CR10) 2013; 74 Tan (CR8) 2013; 72 Zhang, Wu, Qin, Domingo-Ferrer (CR23) 2011; 181 CR5 Yang, Cao (CR27) 2012; 85 CR28 Devaney (CR29) 1986 Zhang (CR32) 2008; 37 Diffie, Hellman (CR17) 1976; -22 CR22 CR21 CR20 Yoon, Jeon (CR9) 2011; 16 Gong, Li, Shi (CR16) 2012; 70 Han (CR3) 2008; 38 Lee, Chen, Wu, Huang (CR6) 2012; 69 JH Yang (1388_CR27) 2012; 85 RM James (1388_CR30) 1975 1388_CR5 CC Lee (1388_CR6) 2012; 69 L Zhang (1388_CR23) 2011; 181 Z Tan (1388_CR8) 2013; 72 H Guo (1388_CR24) 2011; 181 JJ Zhao (1388_CR25) 2012; 184 1388_CR28 CT Li (1388_CR12) 2013; 74 G Alvarez (1388_CR1) 2006; 16 X Wang (1388_CR11) 2010; 15 C Lee (1388_CR14) 2013; 71 1388_CR21 1388_CR20 1388_CR22 P Gong (1388_CR16) 2012; 70 FJ Zhao (1388_CR15) 2013; 74 LR Devaney (1388_CR29) 1986 D He (1388_CR7) 2012; 69 CC Lee (1388_CR13) 2013; 73 1388_CR18 S Han (1388_CR3) 2008; 38 T Xiang (1388_CR4) 2009; 40 1388_CR17 EJ Yoon (1388_CR9) 2011; 16 R Bose (1388_CR33) 2005; 95 1388_CR19 Q Xie (1388_CR10) 2013; 74 1388_CR31 L Zhang (1388_CR32) 2008; 37 H Xiong (1388_CR26) 2012; 55 1388_CR35 1388_CR34 D Xiao (1388_CR2) 2007; 177 |
References_xml | – ident: CR22 – volume: 69 start-page: 79 year: 2012 end-page: 87 ident: CR6 article-title: An extended chaotic maps-based key agreement protocol with user anonymity publication-title: Nonlinear Dyn. doi: 10.1007/s11071-011-0247-4 – volume: 55 start-page: 1213 year: 2012 end-page: 1221 ident: CR26 article-title: Provably secure and efficient certificateless authenticated tripartite key agreement protocol publication-title: Math. Comput. Model. doi: 10.1016/j.mcm.2011.10.001 – volume: 85 start-page: 340 year: 2012 end-page: 350 ident: CR27 article-title: Provably secure three-party password authenticated key exchange protocol in the standard model publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2011.08.024 – ident: CR18 – volume: 181 start-page: 628 year: 2011 end-page: 647 ident: CR24 article-title: Provably secure identity-based key agreement protocols with malicious private key generators publication-title: Inf. Sci. doi: 10.1016/j.ins.2010.09.032 – volume: 74 start-page: 1133 year: 2013 end-page: 1143 ident: CR12 article-title: An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments publication-title: Nonlinear Dyn. doi: 10.1007/s11071-013-1029-y – volume: 38 start-page: 764 issue: 3 year: 2008 end-page: 768 ident: CR3 article-title: Security of a key agreement protocol based on chaotic maps publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2007.01.017 – ident: CR35 – volume: 37 start-page: 669 issue: 3 year: 2008 end-page: 674 ident: CR32 article-title: Cryptanalysis of the public key encryption based on multiple chaotic systems publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2006.09.047 – volume: 184 start-page: 310 year: 2012 end-page: 323 ident: CR25 article-title: Provably secure three-party password-based authenticated key exchange protocol publication-title: Inf. Sci. doi: 10.1016/j.ins.2011.07.015 – volume: 74 start-page: 1021 year: 2013 end-page: 1027 ident: CR10 article-title: Chaotic maps-based three-party password-authenticated key agreement scheme publication-title: Nonlinear Dyn. doi: 10.1007/s11071-013-1020-7 – volume: 40 start-page: 672 issue: 2 year: 2009 end-page: 675 ident: CR4 article-title: On the security of a novel key agreement protocol based on chaotic maps publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2007.08.012 – volume: 69 start-page: 1149 year: 2012 end-page: 1157 ident: CR7 article-title: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol publication-title: Nonlinear Dyn. doi: 10.1007/s11071-012-0335-0 – volume: -22 start-page: 644 issue: 6 year: 1976 end-page: 654 ident: CR17 article-title: New direction in cryptography publication-title: IEEE Trans. Inf. Theory IT – ident: CR21 – volume: 72 start-page: 311 year: 2013 end-page: 320 ident: CR8 article-title: A chaotic maps-based authenticated key agreement protocol with strong anonymity publication-title: Nonlinear Dyn. doi: 10.1007/s11071-012-0715-5 – ident: CR19 – volume: 16 start-page: 2129 issue: 8 year: 2006 end-page: 2151 ident: CR1 article-title: Some basic cryptographic requirements for chaos-based cryptosystems publication-title: Int. J. Bifurc. Chaos doi: 10.1142/S0218127406015970 – volume: 16 start-page: 2383 year: 2011 end-page: 2389 ident: CR9 article-title: An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map publication-title: Commun. Nonlinear Sci. Numer. Simul. doi: 10.1016/j.cnsns.2010.09.021 – volume: 74 start-page: 419 year: 2013 end-page: 427 ident: CR15 article-title: Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials publication-title: Nonlinear Dyn. doi: 10.1007/s11071-013-0979-4 – volume: 19 start-page: 37 issue: 3 year: 1996 end-page: 39 ident: CR31 article-title: Chaos of the Chebyshev polynomials publication-title: Nat. Sci. J. Xiangtan Univ. – volume: 71 start-page: 201 year: 2013 end-page: 211 ident: CR14 article-title: A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps publication-title: Nonlinear Dyn. doi: 10.1007/s11071-012-0652-3 – volume: 95 start-page: 098702 year: 2005 ident: CR33 article-title: Novel public key encryption technique based on multiple chaotic systems publication-title: Phys. Rev. Lett. doi: 10.1103/PhysRevLett.95.098702 – volume: 70 start-page: 2401 year: 2012 end-page: 2406 ident: CR16 article-title: A secure chaotic maps-based key agreement protocol without using smart cards publication-title: Nonlinear Dyn. doi: 10.1007/s11071-012-0628-3 – volume: 177 start-page: 1136 issue: 4 year: 2007 end-page: 1142 ident: CR2 article-title: A novel key agreement protocol based on chaotic maps publication-title: Inf. Sci. doi: 10.1016/j.ins.2006.07.026 – year: 1975 ident: CR30 publication-title: Topology A First Course – volume: 73 start-page: 125 year: 2013 end-page: 132 ident: CR13 article-title: A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps publication-title: Nonlinear Dyn. doi: 10.1007/s11071-013-0772-4 – volume: 181 start-page: 4318 year: 2011 end-page: 4329 ident: CR23 article-title: Provably secure one-round identity-based authenticated asymmetric group key agreement protocol publication-title: Inf. Sci. doi: 10.1016/j.ins.2011.05.009 – ident: CR34 – ident: CR5 – ident: CR28 – year: 1986 ident: CR29 publication-title: An Introduction to Chaotic Dynamical System – volume: 15 start-page: 4052 year: 2010 end-page: 4057 ident: CR11 article-title: An improved key agreement protocol based on chaos publication-title: Commun. Nonlinear Sci. Numer. Simul. doi: 10.1016/j.cnsns.2010.02.014 – ident: CR20 – ident: 1388_CR19 doi: 10.1007/3-540-45682-1_18 – ident: 1388_CR5 doi: 10.1109/ICC.2009.5198581 – ident: 1388_CR18 doi: 10.1007/3-540-45539-6_12 – volume: 16 start-page: 2129 issue: 8 year: 2006 ident: 1388_CR1 publication-title: Int. J. Bifurc. Chaos doi: 10.1142/S0218127406015970 – volume: 95 start-page: 098702 year: 2005 ident: 1388_CR33 publication-title: Phys. Rev. Lett. doi: 10.1103/PhysRevLett.95.098702 – volume: 181 start-page: 4318 year: 2011 ident: 1388_CR23 publication-title: Inf. Sci. doi: 10.1016/j.ins.2011.05.009 – volume: 72 start-page: 311 year: 2013 ident: 1388_CR8 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-012-0715-5 – ident: 1388_CR17 doi: 10.1109/TIT.1976.1055638 – volume: 184 start-page: 310 year: 2012 ident: 1388_CR25 publication-title: Inf. Sci. doi: 10.1016/j.ins.2011.07.015 – ident: 1388_CR20 doi: 10.1145/502014.502018 – volume: 177 start-page: 1136 issue: 4 year: 2007 ident: 1388_CR2 publication-title: Inf. Sci. doi: 10.1016/j.ins.2006.07.026 – volume: 38 start-page: 764 issue: 3 year: 2008 ident: 1388_CR3 publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2007.01.017 – volume: 69 start-page: 79 year: 2012 ident: 1388_CR6 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-011-0247-4 – volume: 73 start-page: 125 year: 2013 ident: 1388_CR13 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-013-0772-4 – ident: 1388_CR28 doi: 10.1109/ISCAS.2003.1204947 – volume-title: An Introduction to Chaotic Dynamical System year: 1986 ident: 1388_CR29 – volume: 74 start-page: 1021 year: 2013 ident: 1388_CR10 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-013-1020-7 – ident: 1388_CR21 doi: 10.1007/11935230_22 – volume: 37 start-page: 669 issue: 3 year: 2008 ident: 1388_CR32 publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2006.09.047 – volume: 85 start-page: 340 year: 2012 ident: 1388_CR27 publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2011.08.024 – volume-title: Topology A First Course year: 1975 ident: 1388_CR30 – volume: 55 start-page: 1213 year: 2012 ident: 1388_CR26 publication-title: Math. Comput. Model. doi: 10.1016/j.mcm.2011.10.001 – ident: 1388_CR34 doi: 10.1017/CBO9780511546891 – ident: 1388_CR35 – volume: 16 start-page: 2383 year: 2011 ident: 1388_CR9 publication-title: Commun. Nonlinear Sci. Numer. Simul. doi: 10.1016/j.cnsns.2010.09.021 – volume: 15 start-page: 4052 year: 2010 ident: 1388_CR11 publication-title: Commun. Nonlinear Sci. Numer. Simul. doi: 10.1016/j.cnsns.2010.02.014 – ident: 1388_CR31 – volume: 70 start-page: 2401 year: 2012 ident: 1388_CR16 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-012-0628-3 – volume: 181 start-page: 628 year: 2011 ident: 1388_CR24 publication-title: Inf. Sci. doi: 10.1016/j.ins.2010.09.032 – volume: 74 start-page: 1133 year: 2013 ident: 1388_CR12 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-013-1029-y – ident: 1388_CR22 doi: 10.1007/978-3-540-70500-0_6 – volume: 71 start-page: 201 year: 2013 ident: 1388_CR14 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-012-0652-3 – volume: 40 start-page: 672 issue: 2 year: 2009 ident: 1388_CR4 publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2007.08.012 – volume: 74 start-page: 419 year: 2013 ident: 1388_CR15 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-013-0979-4 – volume: 69 start-page: 1149 year: 2012 ident: 1388_CR7 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-012-0335-0 |
SSID | ssj0003208 |
Score | 2.1882718 |
Snippet | Recently, several key agreement protocols based on Chebyshev chaotic maps have been proposed in the literature. However, they can normally achieve “heuristic”... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1427 |
SubjectTerms | Agreements Automotive Engineering Chebyshev approximation Classical Mechanics Control Dynamical Systems Encryption Engineering Mechanical Engineering Original Paper Protocol Protocol (computers) Pseudorandom Security Vibration |
SummonAdditionalLinks | – databaseName: SpringerLink Journals (ICM) dbid: U2A link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwEA46X_TBH1NxOiUPPimBNmnW9nEMxxAUHxzsrTTpxQmzG2sdbH-9l65dVVTwOWkC_S657-5yd4RcByaUBlUzQ8uLMy8JNUMWErCko2xEMdBK2nznh8fOYOjdj-SozOPOqtfuVUiyuKnrZDe0VKzp69m6eQFbbZMdaU13FOIh726uX8GLNnQOGhbWCTGqQpk_LfFVGdUM81tQtNA1_UOyX5JE2l2jekS2IG2Sg5Iw0vI4Zk2y96ma4DGBp_l0EavJkmbWiQ40R5yAzVA4lhTPKo3Rti68gdRWZ5iiCFD77P2F9sZg3dSwoHocT3FT-hbPMvqa4hJAK28DLbrmnJBh_-65N2BlFwWmRcBzFgN3hG98R2vOfTfUPigdoEVsXEco3wilYu4p6SgjjCOVNMp1ET7o4LCGWJySRjpN4YxQHkvFEzcxCXBPI7UBIZBxJtoPAbVa0CJO9TsjXZYYt50uJlFdHNkiECECkUUgWrXIzeaT2bq-xl-T2xVGUXnUsggvJFtCXnLc_rbCrR7-dbHzf82-ILvcyk3xuqxNGvn8HS6RjuTqqhC_D25I2Dk priority: 102 providerName: Springer Nature |
Title | Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model |
URI | https://link.springer.com/article/10.1007/s11071-014-1388-z https://www.proquest.com/docview/2259430528 |
Volume | 77 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT-MwEB4t9AKHffDQlkflAyeQRWInjXtCpWpBu1qEEJXKKYodG5DYpksKUvvrdyZ12t2Vttc4dqR843l8Y88AnCjXiR2aZo6Rl-BR3jEcvRDF87amjKIyOqb7zj9u2tfD6NsoHnnCrfTHKmudWCnqvDDEkZ-j3FGl8Fioi8kvTl2jKLvqW2hsQANVsMLgq3HZv7m9W-piKaqedAFGGcRIjOq8ZnV5DiMfCqUjqsOn-Pxvy7RyN__JkFaGZ_AZPnqPkXUXEH-BD3a8A5-898j83ix3YPuP0oK7YG9fi_dMv8xYSYy6ZVMEzfIJSsqM4cZlGQbaFTXIqFRDgfLA6Az8I-s9WeKs7TszT1mBH2U_s0nJnse4hGU19cCqFjp7MBz073vX3LdU4EYqMeWZFYFMXBIYI0QSdkxitVEYHrswkDpxUutMRDoOtJMuiHXsdBgilraNw8Zmch82x8XYfgUmsliLPMxdbkVk0M-xUqL7mZukY9HEqSYE9e9Mja83Tm0vXtJVpWRCIEUEUkIgnTfhdDllsii2se7loxqj1O-7Ml1JSRPOatxWw_9d7GD9YoewJUhQqrNlR7A5fX2zx-iMTHULNtTgqgWN7tXD937Lyx8-HYrub1C73_U |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB614dByANqCCBS6h_YCWmHv2vH6gBAqhPQpDq2Um-tdz1KkEoc4FKU_it_IjGM3UKm99bz2WN75dt47A7BtfBp7Us2SPC8loyJ1kqwQI4ue5YyicTbm-85Hx73BabQ_jIdL8Ke9C8Nlla1MrAV1UTqOkb8j3HGn8FiZD-OfkqdGcXa1HaExh8UBzn6Ty1a93_tE_N1Rqv_5ZHcgm6kC0mmjpjJHFejEJ4FzSiVh6hK0zpCH6MNA28Rra3MV2TiwXvsgtrG3YUi_gz1adphrorsMDyKtUz5Rpv_lWvJrVU_AC8in4fjHsM2i1lf1yM9ixz3irn9GXv2vBxfG7Y18bK3m-k_gUWOfio9zQK3BEo7W4XFjq4pGElTr8PCfRoYbgF8n5WVuL2ai4vg9iilBBOWYcDkTJCZETm59HYgU3BiiJPQJrrj_JnbPkSPkeCnceV7SR8WPfFyJ7yMigaINdIh6YM9TOL2XrX4GnVE5wucgVB5bVYSFL1BFjqwq1JqM3cIlKZJCNV0I2u3MXNPdnIdsXGSLvszMgYw4kDEHsqsuvLl-ZTxv7XHXw5stj7LmlFfZApNdeNvybbF8K7EXdxPbgpXBydFhdrh3fPASVhWDpq5q24TOdPILX5EZNLWva-wJOLtvsP8Fgz4ZGQ |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NT8IwFG8UE6MHP1AjitqDJ03D1m5sOxKU4BfhIAm3Ze1aMcFtYZME_npfxwZq1MRzuzbZ77Xvq-_3ELp0lWcrUM0EPC9KrNATBKwQl4RNrjOKruC2rnd-6jW7A-t-aA-LPqdp-dq9TEkuaho0S1OUNZJQNVaFb-C1aDfY0hx6Lpmvow24jU0t1gPaWl7FjOYt6QxwMnRAYlimNX9a4qtiWlmb3xKkud7p7KGdwmDErQXC-2hNRlW0WxiPuDiaaRVtf2IWPECyP4mnAR_PcKoD6hJngJkkCQjKDMO5xQH42XlkEGumhhjEAesn8C-4PZI6ZC2nWIyCGDbFb0GS4tcIlpC4jDzgvIPOIRp0bp_bXVJ0VCCCuTQjgaQGc5RjCEGpY3rCkVy44B0r02DcUYzzgFrcNrhiyrC5rbhpApSyCcNCBuwIVaI4kscI08DmNDRDFUpqCTBzJGNgfYbC8SRoOLeGjPJ3-qKgG9ddL8b-iihZI-ADAr5GwJ_X0NXyk2TBtfHX5HqJkV8cu9SHy0nTydsUtr8ucVsN_7rYyb9mX6DN_k3Hf7zrPZyiLapFKH90VkeVbPIuz8BKyfh5LokfcDLfaA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Provably+secure+three-party+key+agreement+protocol+using+Chebyshev+chaotic+maps+in+the+standard+model&rft.jtitle=Nonlinear+dynamics&rft.au=Lai%2C+Hong&rft.au=Orgun%2C+Mehmet+A&rft.au=Xiao%2C+Jinghua&rft.au=Pieprzyk%2C+Josef&rft.date=2014-09-01&rft.pub=Springer+Nature+B.V&rft.issn=0924-090X&rft.eissn=1573-269X&rft.volume=77&rft.issue=4&rft.spage=1427&rft.epage=1439&rft_id=info:doi/10.1007%2Fs11071-014-1388-z |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0924-090X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0924-090X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0924-090X&client=summon |