作者
Shuming Qiu, Ding Wang, Guoai Xu, Saru Kumari
发表日期
2020/9/8
期刊
IEEE Transactions on Dependable and Secure Computing
卷号
19
期号
2
页码范围
1338-1351
出版商
IEEE
简介
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA) protocols based on public-key techniques have attracted much attention, providing secure access and communication mechanism for various application environments. Among these public-key techniques used for AKA protocols, chaotic-map is more effective than scalar multiplication and modular exponentiation, and it offers a list of desirable cryptographic properties such as un-predictability, un-repeatability, un-certainty, and higher efficiency than scalar multiplication and modular exponentiation. Furthermore, it is usually believed that three-factor AKA protocols can achieve a higher security level than single- and two-factor protocols. However, none of existing three-factor AKA protocols can meet all security requirements. One of the most prevalent problems is how to balance security and usability, and particularly how to …
引用总数
20202021202220232024852585732