Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model

Recently, several key agreement protocols based on Chebyshev chaotic maps have been proposed in the literature. However, they can normally achieve “heuristic” security, that is, once drawbacks are found in these protocols, they are either modified to resist the new attacks, or are discarded. Under t...

Full description

Saved in:
Bibliographic Details
Published inNonlinear dynamics Vol. 77; no. 4; pp. 1427 - 1439
Main Authors Lai, Hong, Orgun, Mehmet A., Xiao, Jinghua, Pieprzyk, Josef, Xue, Liyin, Yang, Yixian
Format Journal Article
LanguageEnglish
Published Dordrecht Springer Netherlands 01.09.2014
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Recently, several key agreement protocols based on Chebyshev chaotic maps have been proposed in the literature. However, they can normally achieve “heuristic” security, that is, once drawbacks are found in these protocols, they are either modified to resist the new attacks, or are discarded. Under these circumstances, it is necessary and significant to define standard security models that can precisely characterize the capabilities of the participants and a potent adversary. Hence, we propose to use public key encryption based on enhanced Chebyshev chaotic maps and pseudo-random function ensembles to construct an efficient three-party key agreement protocol under the standard model, in which the adversary is able to make a wider range of queries and have more freedom than the other proposed schemes. In the design of our protocol, we follow the ideas in the recent key agreement protocol of Yang and Cao’s. The proposed protocol is shown to be provably secure if decisional Diffie–Hellman problem, which is based on Chebyshev chaotic maps, is computationally infeasible. To the best of our knowledge, our protocol is the first provably secure 3PAKE protocol using Chebyshev chaotic maps under the standard model.
AbstractList Recently, several key agreement protocols based on Chebyshev chaotic maps have been proposed in the literature. However, they can normally achieve “heuristic” security, that is, once drawbacks are found in these protocols, they are either modified to resist the new attacks, or are discarded. Under these circumstances, it is necessary and significant to define standard security models that can precisely characterize the capabilities of the participants and a potent adversary. Hence, we propose to use public key encryption based on enhanced Chebyshev chaotic maps and pseudo-random function ensembles to construct an efficient three-party key agreement protocol under the standard model, in which the adversary is able to make a wider range of queries and have more freedom than the other proposed schemes. In the design of our protocol, we follow the ideas in the recent key agreement protocol of Yang and Cao’s. The proposed protocol is shown to be provably secure if decisional Diffie–Hellman problem, which is based on Chebyshev chaotic maps, is computationally infeasible. To the best of our knowledge, our protocol is the first provably secure 3PAKE protocol using Chebyshev chaotic maps under the standard model.
Author Yang, Yixian
Orgun, Mehmet A.
Xiao, Jinghua
Pieprzyk, Josef
Lai, Hong
Xue, Liyin
Author_xml – sequence: 1
  givenname: Hong
  surname: Lai
  fullname: Lai, Hong
  email: hong.lai@students.mq.edu.au
  organization: School of Science, Beijing University of Posts and Telecommunications, Department of Computing, Macquarie University
– sequence: 2
  givenname: Mehmet A.
  surname: Orgun
  fullname: Orgun, Mehmet A.
  organization: Department of Computing, Macquarie University
– sequence: 3
  givenname: Jinghua
  surname: Xiao
  fullname: Xiao, Jinghua
  organization: School of Science, Beijing University of Posts and Telecommunications
– sequence: 4
  givenname: Josef
  surname: Pieprzyk
  fullname: Pieprzyk, Josef
  organization: Department of Computing, Macquarie University
– sequence: 5
  givenname: Liyin
  surname: Xue
  fullname: Xue, Liyin
  organization: Corporate Analytics The Australian Taxation Office
– sequence: 6
  givenname: Yixian
  surname: Yang
  fullname: Yang, Yixian
  organization: Information Security Center, Beijing University of Posts and Telecommunications
BookMark eNp9kE9LJDEQxYMoOP75AN4CnrNWkm7TfZRhVwVh97CCt5BkKjOtPcmYZISeT29kBGHBPRVFvd-rxzshhyEGJOSCww8OoK4y56A4A94wLruO7Q7IjLdKMnHdPx2SGfSiYdDD0zE5yfkZAKSAbkbwT4pvxo4Tzei2CWlZJUS2MalM9AUnapZ1X2ModJNiiS6OdJuHsKTzFdopr_CNupWJZXB0bTaZDqFaIM3FhIVJC7qOCxzPyJE3Y8bzz3lKHn_9_Du_Yw-_b-_nNw_MyU4UZlCAVF6Bc0Io3juF1nWqEZ6DtMpLa41obAvWSw-tbb3l3PMWr-vZoZGn5HLvW7O-bjEX_Ry3KdSXWoi2byS0oqsqtVe5FHNO6LUbiilDDCWZYdQc9Eenet-prp3qj071rpL8H3KThrVJ038ZsWdy1YYlpq9M30PvV9GN8A
CitedBy_id crossref_primary_10_1007_s11071_021_06898_y
crossref_primary_10_1007_s11071_015_2580_5
crossref_primary_10_1109_ACCESS_2020_2979251
crossref_primary_10_1109_ACCESS_2024_3375343
crossref_primary_10_1109_ACCESS_2023_3325886
crossref_primary_10_1007_s11227_024_06467_1
crossref_primary_10_1007_s11277_017_4902_z
crossref_primary_10_1007_s11071_015_2506_2
crossref_primary_10_1007_s11042_022_13078_6
crossref_primary_10_1371_journal_pone_0213976
crossref_primary_10_1038_s41598_025_89208_5
crossref_primary_10_1088_1674_1056_24_11_110505
crossref_primary_10_1007_s11071_015_2467_5
crossref_primary_10_1007_s11071_018_04748_y
crossref_primary_10_1155_2022_4260804
crossref_primary_10_1109_ACCESS_2020_2979906
crossref_primary_10_1007_s10623_025_01574_3
crossref_primary_10_1007_s10586_023_04232_2
crossref_primary_10_1007_s11071_014_1816_0
crossref_primary_10_1002_cpe_4523
crossref_primary_10_3390_a17090389
Cites_doi 10.1007/s11071-011-0247-4
10.1016/j.mcm.2011.10.001
10.1016/j.jss.2011.08.024
10.1016/j.ins.2010.09.032
10.1007/s11071-013-1029-y
10.1016/j.chaos.2007.01.017
10.1016/j.chaos.2006.09.047
10.1016/j.ins.2011.07.015
10.1007/s11071-013-1020-7
10.1016/j.chaos.2007.08.012
10.1007/s11071-012-0335-0
10.1007/s11071-012-0715-5
10.1142/S0218127406015970
10.1016/j.cnsns.2010.09.021
10.1007/s11071-013-0979-4
10.1007/s11071-012-0652-3
10.1103/PhysRevLett.95.098702
10.1007/s11071-012-0628-3
10.1016/j.ins.2006.07.026
10.1007/s11071-013-0772-4
10.1016/j.ins.2011.05.009
10.1016/j.cnsns.2010.02.014
10.1007/3-540-45682-1_18
10.1109/ICC.2009.5198581
10.1007/3-540-45539-6_12
10.1109/TIT.1976.1055638
10.1145/502014.502018
10.1109/ISCAS.2003.1204947
10.1007/11935230_22
10.1017/CBO9780511546891
10.1007/978-3-540-70500-0_6
ContentType Journal Article
Copyright Springer Science+Business Media Dordrecht 2014
Nonlinear Dynamics is a copyright of Springer, (2014). All Rights Reserved.
Copyright_xml – notice: Springer Science+Business Media Dordrecht 2014
– notice: Nonlinear Dynamics is a copyright of Springer, (2014). All Rights Reserved.
DBID AAYXX
CITATION
8FE
8FG
ABJCF
AFKRA
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
L6V
M7S
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
DOI 10.1007/s11071-014-1388-z
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central UK/Ireland
ProQuest Central
ProQuest Technology Collection
ProQuest One Community College
ProQuest Central Korea
SciTech Premium Collection
ProQuest Engineering Collection
Engineering Database
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering collection
DatabaseTitle CrossRef
Engineering Database
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest One Academic UKI Edition
ProQuest Central Korea
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest Central (New)
Engineering Collection
ProQuest One Academic (New)
DatabaseTitleList
Engineering Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
Engineering
EISSN 1573-269X
EndPage 1439
ExternalDocumentID 10_1007_s11071_014_1388_z
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
-~X
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29N
29~
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
8FE
8FG
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABJCF
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFFNX
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARCEE
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
F5P
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
L6V
LAK
LLZTM
M4Y
M7S
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P9T
PF0
PT4
PT5
PTHSS
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCV
SDH
SDM
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WH7
WK8
YLTOR
Z45
Z5O
Z7R
Z7S
Z7X
Z7Y
Z7Z
Z83
Z86
Z88
Z8M
Z8N
Z8R
Z8S
Z8T
Z8W
Z8Z
Z92
ZMTXR
_50
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
AMVHM
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
DWQXO
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c382t-ae2037f70cc22719c7ebc8742f103b7f3bba24b50bf3f05b5fb11f15e603bcea3
IEDL.DBID BENPR
ISSN 0924-090X
IngestDate Fri Jul 25 11:11:38 EDT 2025
Tue Aug 05 12:02:02 EDT 2025
Thu Apr 24 23:06:40 EDT 2025
Fri Feb 21 02:33:57 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Standard model
Heuristic security
Enhanced Chebyshev chaotic maps
Pseudo-random function ensembles
Decisional Diffie–Hellman
Language English
License http://www.springer.com/tdm
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c382t-ae2037f70cc22719c7ebc8742f103b7f3bba24b50bf3f05b5fb11f15e603bcea3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2259430528
PQPubID 2043746
PageCount 13
ParticipantIDs proquest_journals_2259430528
crossref_citationtrail_10_1007_s11071_014_1388_z
crossref_primary_10_1007_s11071_014_1388_z
springer_journals_10_1007_s11071_014_1388_z
PublicationCentury 2000
PublicationDate 2014-09-01
PublicationDateYYYYMMDD 2014-09-01
PublicationDate_xml – month: 09
  year: 2014
  text: 2014-09-01
  day: 01
PublicationDecade 2010
PublicationPlace Dordrecht
PublicationPlace_xml – name: Dordrecht
PublicationSubtitle An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems
PublicationTitle Nonlinear dynamics
PublicationTitleAbbrev Nonlinear Dyn
PublicationYear 2014
Publisher Springer Netherlands
Springer Nature B.V
Publisher_xml – name: Springer Netherlands
– name: Springer Nature B.V
References James (CR30) 1975
Alvarez, Li (CR1) 2006; 16
Lee, Li, Hsu (CR13) 2013; 73
CR19
Xiao, Liao, Deng (CR2) 2007; 177
CR18
CR35
CR34
Zhao, Gu (CR25) 2012; 184
Xiang, Wong, Liao (CR4) 2009; 40
Wang, Zhao (CR11) 2010; 15
Li, Lee, Weng (CR12) 2013; 74
Zhao, Gong, Li, Li, Li (CR15) 2013; 74
Guo, li, Mu, Zhang (CR24) 2011; 181
Xiong, Chen, Li (CR26) 2012; 55
Bose (CR33) 2005; 95
Lee, Hsu (CR14) 2013; 71
Jiang, Peng (CR31) 1996; 19
He, Chen, Chen (CR7) 2012; 69
Xie, Zhao, Yu (CR10) 2013; 74
Tan (CR8) 2013; 72
Zhang, Wu, Qin, Domingo-Ferrer (CR23) 2011; 181
CR5
Yang, Cao (CR27) 2012; 85
CR28
Devaney (CR29) 1986
Zhang (CR32) 2008; 37
Diffie, Hellman (CR17) 1976; -22
CR22
CR21
CR20
Yoon, Jeon (CR9) 2011; 16
Gong, Li, Shi (CR16) 2012; 70
Han (CR3) 2008; 38
Lee, Chen, Wu, Huang (CR6) 2012; 69
JH Yang (1388_CR27) 2012; 85
RM James (1388_CR30) 1975
1388_CR5
CC Lee (1388_CR6) 2012; 69
L Zhang (1388_CR23) 2011; 181
Z Tan (1388_CR8) 2013; 72
H Guo (1388_CR24) 2011; 181
JJ Zhao (1388_CR25) 2012; 184
1388_CR28
CT Li (1388_CR12) 2013; 74
G Alvarez (1388_CR1) 2006; 16
X Wang (1388_CR11) 2010; 15
C Lee (1388_CR14) 2013; 71
1388_CR21
1388_CR20
1388_CR22
P Gong (1388_CR16) 2012; 70
FJ Zhao (1388_CR15) 2013; 74
LR Devaney (1388_CR29) 1986
D He (1388_CR7) 2012; 69
CC Lee (1388_CR13) 2013; 73
1388_CR18
S Han (1388_CR3) 2008; 38
T Xiang (1388_CR4) 2009; 40
1388_CR17
EJ Yoon (1388_CR9) 2011; 16
R Bose (1388_CR33) 2005; 95
1388_CR19
Q Xie (1388_CR10) 2013; 74
1388_CR31
L Zhang (1388_CR32) 2008; 37
H Xiong (1388_CR26) 2012; 55
1388_CR35
1388_CR34
D Xiao (1388_CR2) 2007; 177
References_xml – ident: CR22
– volume: 69
  start-page: 79
  year: 2012
  end-page: 87
  ident: CR6
  article-title: An extended chaotic maps-based key agreement protocol with user anonymity
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-011-0247-4
– volume: 55
  start-page: 1213
  year: 2012
  end-page: 1221
  ident: CR26
  article-title: Provably secure and efficient certificateless authenticated tripartite key agreement protocol
  publication-title: Math. Comput. Model.
  doi: 10.1016/j.mcm.2011.10.001
– volume: 85
  start-page: 340
  year: 2012
  end-page: 350
  ident: CR27
  article-title: Provably secure three-party password authenticated key exchange protocol in the standard model
  publication-title: J. Syst. Softw.
  doi: 10.1016/j.jss.2011.08.024
– ident: CR18
– volume: 181
  start-page: 628
  year: 2011
  end-page: 647
  ident: CR24
  article-title: Provably secure identity-based key agreement protocols with malicious private key generators
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2010.09.032
– volume: 74
  start-page: 1133
  year: 2013
  end-page: 1143
  ident: CR12
  article-title: An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-013-1029-y
– volume: 38
  start-page: 764
  issue: 3
  year: 2008
  end-page: 768
  ident: CR3
  article-title: Security of a key agreement protocol based on chaotic maps
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2007.01.017
– ident: CR35
– volume: 37
  start-page: 669
  issue: 3
  year: 2008
  end-page: 674
  ident: CR32
  article-title: Cryptanalysis of the public key encryption based on multiple chaotic systems
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2006.09.047
– volume: 184
  start-page: 310
  year: 2012
  end-page: 323
  ident: CR25
  article-title: Provably secure three-party password-based authenticated key exchange protocol
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2011.07.015
– volume: 74
  start-page: 1021
  year: 2013
  end-page: 1027
  ident: CR10
  article-title: Chaotic maps-based three-party password-authenticated key agreement scheme
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-013-1020-7
– volume: 40
  start-page: 672
  issue: 2
  year: 2009
  end-page: 675
  ident: CR4
  article-title: On the security of a novel key agreement protocol based on chaotic maps
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2007.08.012
– volume: 69
  start-page: 1149
  year: 2012
  end-page: 1157
  ident: CR7
  article-title: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-012-0335-0
– volume: -22
  start-page: 644
  issue: 6
  year: 1976
  end-page: 654
  ident: CR17
  article-title: New direction in cryptography
  publication-title: IEEE Trans. Inf. Theory IT
– ident: CR21
– volume: 72
  start-page: 311
  year: 2013
  end-page: 320
  ident: CR8
  article-title: A chaotic maps-based authenticated key agreement protocol with strong anonymity
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-012-0715-5
– ident: CR19
– volume: 16
  start-page: 2129
  issue: 8
  year: 2006
  end-page: 2151
  ident: CR1
  article-title: Some basic cryptographic requirements for chaos-based cryptosystems
  publication-title: Int. J. Bifurc. Chaos
  doi: 10.1142/S0218127406015970
– volume: 16
  start-page: 2383
  year: 2011
  end-page: 2389
  ident: CR9
  article-title: An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
  doi: 10.1016/j.cnsns.2010.09.021
– volume: 74
  start-page: 419
  year: 2013
  end-page: 427
  ident: CR15
  article-title: Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-013-0979-4
– volume: 19
  start-page: 37
  issue: 3
  year: 1996
  end-page: 39
  ident: CR31
  article-title: Chaos of the Chebyshev polynomials
  publication-title: Nat. Sci. J. Xiangtan Univ.
– volume: 71
  start-page: 201
  year: 2013
  end-page: 211
  ident: CR14
  article-title: A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-012-0652-3
– volume: 95
  start-page: 098702
  year: 2005
  ident: CR33
  article-title: Novel public key encryption technique based on multiple chaotic systems
  publication-title: Phys. Rev. Lett.
  doi: 10.1103/PhysRevLett.95.098702
– volume: 70
  start-page: 2401
  year: 2012
  end-page: 2406
  ident: CR16
  article-title: A secure chaotic maps-based key agreement protocol without using smart cards
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-012-0628-3
– volume: 177
  start-page: 1136
  issue: 4
  year: 2007
  end-page: 1142
  ident: CR2
  article-title: A novel key agreement protocol based on chaotic maps
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2006.07.026
– year: 1975
  ident: CR30
  publication-title: Topology A First Course
– volume: 73
  start-page: 125
  year: 2013
  end-page: 132
  ident: CR13
  article-title: A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-013-0772-4
– volume: 181
  start-page: 4318
  year: 2011
  end-page: 4329
  ident: CR23
  article-title: Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2011.05.009
– ident: CR34
– ident: CR5
– ident: CR28
– year: 1986
  ident: CR29
  publication-title: An Introduction to Chaotic Dynamical System
– volume: 15
  start-page: 4052
  year: 2010
  end-page: 4057
  ident: CR11
  article-title: An improved key agreement protocol based on chaos
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
  doi: 10.1016/j.cnsns.2010.02.014
– ident: CR20
– ident: 1388_CR19
  doi: 10.1007/3-540-45682-1_18
– ident: 1388_CR5
  doi: 10.1109/ICC.2009.5198581
– ident: 1388_CR18
  doi: 10.1007/3-540-45539-6_12
– volume: 16
  start-page: 2129
  issue: 8
  year: 2006
  ident: 1388_CR1
  publication-title: Int. J. Bifurc. Chaos
  doi: 10.1142/S0218127406015970
– volume: 95
  start-page: 098702
  year: 2005
  ident: 1388_CR33
  publication-title: Phys. Rev. Lett.
  doi: 10.1103/PhysRevLett.95.098702
– volume: 181
  start-page: 4318
  year: 2011
  ident: 1388_CR23
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2011.05.009
– volume: 72
  start-page: 311
  year: 2013
  ident: 1388_CR8
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-012-0715-5
– ident: 1388_CR17
  doi: 10.1109/TIT.1976.1055638
– volume: 184
  start-page: 310
  year: 2012
  ident: 1388_CR25
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2011.07.015
– ident: 1388_CR20
  doi: 10.1145/502014.502018
– volume: 177
  start-page: 1136
  issue: 4
  year: 2007
  ident: 1388_CR2
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2006.07.026
– volume: 38
  start-page: 764
  issue: 3
  year: 2008
  ident: 1388_CR3
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2007.01.017
– volume: 69
  start-page: 79
  year: 2012
  ident: 1388_CR6
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-011-0247-4
– volume: 73
  start-page: 125
  year: 2013
  ident: 1388_CR13
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-013-0772-4
– ident: 1388_CR28
  doi: 10.1109/ISCAS.2003.1204947
– volume-title: An Introduction to Chaotic Dynamical System
  year: 1986
  ident: 1388_CR29
– volume: 74
  start-page: 1021
  year: 2013
  ident: 1388_CR10
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-013-1020-7
– ident: 1388_CR21
  doi: 10.1007/11935230_22
– volume: 37
  start-page: 669
  issue: 3
  year: 2008
  ident: 1388_CR32
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2006.09.047
– volume: 85
  start-page: 340
  year: 2012
  ident: 1388_CR27
  publication-title: J. Syst. Softw.
  doi: 10.1016/j.jss.2011.08.024
– volume-title: Topology A First Course
  year: 1975
  ident: 1388_CR30
– volume: 55
  start-page: 1213
  year: 2012
  ident: 1388_CR26
  publication-title: Math. Comput. Model.
  doi: 10.1016/j.mcm.2011.10.001
– ident: 1388_CR34
  doi: 10.1017/CBO9780511546891
– ident: 1388_CR35
– volume: 16
  start-page: 2383
  year: 2011
  ident: 1388_CR9
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
  doi: 10.1016/j.cnsns.2010.09.021
– volume: 15
  start-page: 4052
  year: 2010
  ident: 1388_CR11
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
  doi: 10.1016/j.cnsns.2010.02.014
– ident: 1388_CR31
– volume: 70
  start-page: 2401
  year: 2012
  ident: 1388_CR16
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-012-0628-3
– volume: 181
  start-page: 628
  year: 2011
  ident: 1388_CR24
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2010.09.032
– volume: 74
  start-page: 1133
  year: 2013
  ident: 1388_CR12
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-013-1029-y
– ident: 1388_CR22
  doi: 10.1007/978-3-540-70500-0_6
– volume: 71
  start-page: 201
  year: 2013
  ident: 1388_CR14
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-012-0652-3
– volume: 40
  start-page: 672
  issue: 2
  year: 2009
  ident: 1388_CR4
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2007.08.012
– volume: 74
  start-page: 419
  year: 2013
  ident: 1388_CR15
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-013-0979-4
– volume: 69
  start-page: 1149
  year: 2012
  ident: 1388_CR7
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-012-0335-0
SSID ssj0003208
Score 2.1882718
Snippet Recently, several key agreement protocols based on Chebyshev chaotic maps have been proposed in the literature. However, they can normally achieve “heuristic”...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1427
SubjectTerms Agreements
Automotive Engineering
Chebyshev approximation
Classical Mechanics
Control
Dynamical Systems
Encryption
Engineering
Mechanical Engineering
Original Paper
Protocol
Protocol (computers)
Pseudorandom
Security
Vibration
SummonAdditionalLinks – databaseName: SpringerLink Journals (ICM)
  dbid: U2A
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwEA46X_TBH1NxOiUPPimBNmnW9nEMxxAUHxzsrTTpxQmzG2sdbH-9l65dVVTwOWkC_S657-5yd4RcByaUBlUzQ8uLMy8JNUMWErCko2xEMdBK2nznh8fOYOjdj-SozOPOqtfuVUiyuKnrZDe0VKzp69m6eQFbbZMdaU13FOIh726uX8GLNnQOGhbWCTGqQpk_LfFVGdUM81tQtNA1_UOyX5JE2l2jekS2IG2Sg5Iw0vI4Zk2y96ma4DGBp_l0EavJkmbWiQ40R5yAzVA4lhTPKo3Rti68gdRWZ5iiCFD77P2F9sZg3dSwoHocT3FT-hbPMvqa4hJAK28DLbrmnJBh_-65N2BlFwWmRcBzFgN3hG98R2vOfTfUPigdoEVsXEco3wilYu4p6SgjjCOVNMp1ET7o4LCGWJySRjpN4YxQHkvFEzcxCXBPI7UBIZBxJtoPAbVa0CJO9TsjXZYYt50uJlFdHNkiECECkUUgWrXIzeaT2bq-xl-T2xVGUXnUsggvJFtCXnLc_rbCrR7-dbHzf82-ILvcyk3xuqxNGvn8HS6RjuTqqhC_D25I2Dk
  priority: 102
  providerName: Springer Nature
Title Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
URI https://link.springer.com/article/10.1007/s11071-014-1388-z
https://www.proquest.com/docview/2259430528
Volume 77
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT-MwEB4t9AKHffDQlkflAyeQRWInjXtCpWpBu1qEEJXKKYodG5DYpksKUvvrdyZ12t2Vttc4dqR843l8Y88AnCjXiR2aZo6Rl-BR3jEcvRDF87amjKIyOqb7zj9u2tfD6NsoHnnCrfTHKmudWCnqvDDEkZ-j3FGl8Fioi8kvTl2jKLvqW2hsQANVsMLgq3HZv7m9W-piKaqedAFGGcRIjOq8ZnV5DiMfCqUjqsOn-Pxvy7RyN__JkFaGZ_AZPnqPkXUXEH-BD3a8A5-898j83ix3YPuP0oK7YG9fi_dMv8xYSYy6ZVMEzfIJSsqM4cZlGQbaFTXIqFRDgfLA6Az8I-s9WeKs7TszT1mBH2U_s0nJnse4hGU19cCqFjp7MBz073vX3LdU4EYqMeWZFYFMXBIYI0QSdkxitVEYHrswkDpxUutMRDoOtJMuiHXsdBgilraNw8Zmch82x8XYfgUmsliLPMxdbkVk0M-xUqL7mZukY9HEqSYE9e9Mja83Tm0vXtJVpWRCIEUEUkIgnTfhdDllsii2se7loxqj1O-7Ml1JSRPOatxWw_9d7GD9YoewJUhQqrNlR7A5fX2zx-iMTHULNtTgqgWN7tXD937Lyx8-HYrub1C73_U
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB614dByANqCCBS6h_YCWmHv2vH6gBAqhPQpDq2Um-tdz1KkEoc4FKU_it_IjGM3UKm99bz2WN75dt47A7BtfBp7Us2SPC8loyJ1kqwQI4ue5YyicTbm-85Hx73BabQ_jIdL8Ke9C8Nlla1MrAV1UTqOkb8j3HGn8FiZD-OfkqdGcXa1HaExh8UBzn6Ty1a93_tE_N1Rqv_5ZHcgm6kC0mmjpjJHFejEJ4FzSiVh6hK0zpCH6MNA28Rra3MV2TiwXvsgtrG3YUi_gz1adphrorsMDyKtUz5Rpv_lWvJrVU_AC8in4fjHsM2i1lf1yM9ixz3irn9GXv2vBxfG7Y18bK3m-k_gUWOfio9zQK3BEo7W4XFjq4pGElTr8PCfRoYbgF8n5WVuL2ai4vg9iilBBOWYcDkTJCZETm59HYgU3BiiJPQJrrj_JnbPkSPkeCnceV7SR8WPfFyJ7yMigaINdIh6YM9TOL2XrX4GnVE5wucgVB5bVYSFL1BFjqwq1JqM3cIlKZJCNV0I2u3MXNPdnIdsXGSLvszMgYw4kDEHsqsuvLl-ZTxv7XHXw5stj7LmlFfZApNdeNvybbF8K7EXdxPbgpXBydFhdrh3fPASVhWDpq5q24TOdPILX5EZNLWva-wJOLtvsP8Fgz4ZGQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NT8IwFG8UE6MHP1AjitqDJ03D1m5sOxKU4BfhIAm3Ze1aMcFtYZME_npfxwZq1MRzuzbZ77Xvq-_3ELp0lWcrUM0EPC9KrNATBKwQl4RNrjOKruC2rnd-6jW7A-t-aA-LPqdp-dq9TEkuaho0S1OUNZJQNVaFb-C1aDfY0hx6Lpmvow24jU0t1gPaWl7FjOYt6QxwMnRAYlimNX9a4qtiWlmb3xKkud7p7KGdwmDErQXC-2hNRlW0WxiPuDiaaRVtf2IWPECyP4mnAR_PcKoD6hJngJkkCQjKDMO5xQH42XlkEGumhhjEAesn8C-4PZI6ZC2nWIyCGDbFb0GS4tcIlpC4jDzgvIPOIRp0bp_bXVJ0VCCCuTQjgaQGc5RjCEGpY3rCkVy44B0r02DcUYzzgFrcNrhiyrC5rbhpApSyCcNCBuwIVaI4kscI08DmNDRDFUpqCTBzJGNgfYbC8SRoOLeGjPJ3-qKgG9ddL8b-iihZI-ADAr5GwJ_X0NXyk2TBtfHX5HqJkV8cu9SHy0nTydsUtr8ucVsN_7rYyb9mX6DN_k3Hf7zrPZyiLapFKH90VkeVbPIuz8BKyfh5LokfcDLfaA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Provably+secure+three-party+key+agreement+protocol+using+Chebyshev+chaotic+maps+in+the+standard+model&rft.jtitle=Nonlinear+dynamics&rft.au=Lai%2C+Hong&rft.au=Orgun%2C+Mehmet+A&rft.au=Xiao%2C+Jinghua&rft.au=Pieprzyk%2C+Josef&rft.date=2014-09-01&rft.pub=Springer+Nature+B.V&rft.issn=0924-090X&rft.eissn=1573-269X&rft.volume=77&rft.issue=4&rft.spage=1427&rft.epage=1439&rft_id=info:doi/10.1007%2Fs11071-014-1388-z
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0924-090X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0924-090X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0924-090X&client=summon