Table of Contents Author Guidelines Submit a Manuscript
Applied Computational Intelligence and Soft Computing
Volume 2016, Article ID 3916942, 10 pages
http://dx.doi.org/10.1155/2016/3916942
Research Article

An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity

1College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
2College of Computer Science, Chongqing University, Chongqing 400044, China
3College of Mathematical Sciences, Dezhou University, Dezhou 253023, China
4School of Electronic Engineering, Dublin City University, Dublin 9, Ireland

Received 19 December 2015; Revised 7 March 2016; Accepted 17 March 2016

Academic Editor: Christian W. Dawson

Copyright © 2016 Yousheng Zhou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y. Wang, X. Liao, D. Xiao, and K.-W. Wong, “One-way hash function construction based on 2D coupled map lattices,” Information Sciences, vol. 178, no. 5, pp. 1391–1406, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  2. A. Akhavan, A. Samsudin, and A. Akhshani, “A novel parallel hash function based on 3D chaotic map,” EURASIP Journal on Advances in Signal Processing, vol. 2013, no. 1, article 126, pp. 1–12, 2013. View at Publisher · View at Google Scholar
  3. H.-P. Ren and Y. Zhuang, “One-way hash function construction based on Chen-type hyper-chaotic system and key-stream,” Journal on Communications, vol. 30, no. 10, pp. 100–113, 2009. View at Google Scholar · View at Scopus
  4. T. Chen, L. Ge, J. Cai, and S. Ma, “TinyTCSec: a novel and lightweight data link encryption scheme for wireless sensor networks,” Chinese Journal of Sensors and Actuators, vol. 24, no. 2, pp. 275–281, 2011. View at Publisher · View at Google Scholar · View at Scopus
  5. S. Chen, X. X. Zhong, and Z. Z. Wu, “Chaos block cipher for wireless sensor network,” Science in China, Series F: Information Sciences, vol. 51, no. 8, pp. 1055–1063, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. T.-M. Chen and L. Ge, “Chaos-based encryption and message authentication algorithm for wireless sensor network,” Journal on Communications, vol. 34, no. 5, pp. 113–120, 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. Y.-Q. Zhang and X.-Y. Wang, “A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice,” Information Sciences, vol. 273, pp. 329–351, 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. X. Wang, D. Luan, and X. Bao, “Cryptanalysis of an image encryption algorithm using Chebyshev generator,” Digital Signal Processing, vol. 25, no. 1, pp. 244–247, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. L. Xuan and J.-N. Yan, “The “one-group-one-cipher” cryptograph of block-cipher based on chaotic,” Journal on Communications A, vol. 30, no. 11, pp. 105–110, 2009. View at Google Scholar · View at Scopus
  10. S. Han and E. Chang, “Chaotic map based key agreement without clock synchronization,” Chaos, Solitons & Fractals, vol. 39, no. 3, pp. 1283–1289, 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. E.-J. Yoon and K.-Y. Yoo, “Replay attacks on Han et al.’s chaotic map based key agreement protocol using nonce,” in Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, D.-S. Huang, D. C. Wunsch II, D. S. Levine, and K.-H. Jo, Eds., vol. 15 of Communications in Computer and Information Science, pp. 533–540, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  12. H.-R. Tseng, R.-H. Jan, and Y. Wuu, “A chaotic maps-based key agreement protocol that preserves user anonymity,” in Proceedings of the IEEE International Conference on Communications (ICC '09), pp. 1–6, IEEE, Dresden, Germany, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. Y. Niu and X. Wang, “An anonymous key agreement protocol based on chaotic maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 4, pp. 1986–1992, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. K. Xue and P. Hong, “Security improvement of an anonymous key agreement protocol based on chaotic maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 7, pp. 2969–2977, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  15. C.-C. Lee, C.-L. Chen, C.-Y. Wu, and S.-Y. Huang, “An extended chaotic maps-based key agreement protocol with user anonymity,” Nonlinear Dynamics, vol. 69, no. 1-2, pp. 79–87, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  16. X. Wang and J. Zhao, “An improved key agreement protocol based on chaos,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 12, pp. 4052–4057, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  17. E.-J. Yoon and I.-S. Jeon, “An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map,” Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 6, pp. 2383–2389, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. H. Lai, J. Xiao, L. Li, and Y. Yang, “Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol,” Mathematical Problems in Engineering, vol. 2012, Article ID 454823, 17 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. F. Zhao, P. Gong, S. Li, M. Li, and P. Li, “Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials,” Nonlinear Dynamics, vol. 74, no. 1-2, pp. 419–427, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. C.-C. Lee, C.-T. Li, and C.-W. Hsu, “A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps,” Nonlinear Dynamics, vol. 73, no. 1-2, pp. 125–132, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  21. Z. Tan, “A chaotic maps-based authenticated key agreement protocol with strong anonymity,” Nonlinear Dynamics, vol. 72, no. 1-2, pp. 311–320, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  22. P. Gong, P. Li, and W. Shi, “A secure chaotic maps-based key agreement protocol without using smart cards,” Nonlinear Dynamics, vol. 70, no. 4, pp. 2401–2406, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  23. X.-Y. Wang and D.-P. Luan, “A secure key agreement protocol based on chaotic maps,” Chinese Physics B, vol. 22, no. 11, Article ID 110503, 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. P. Zhen, G. Zhao, L. Min, and X. Li, “Optimized key agreement protocol based on chaotic maps,” Journal of Communications, vol. 9, no. 5, pp. 398–403, 2014. View at Publisher · View at Google Scholar · View at Scopus
  25. C.-C. Lee, C.-T. Li, S.-T. Chiu, and Y.-M. Lai, “A new three-party-authenticated key agreement scheme based on chaotic maps without password table,” Nonlinear Dynamics, vol. 79, no. 4, pp. 2485–2495, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  26. Q. Xie, B. Hu, and T. Wu, “Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card,” Nonlinear Dynamics, vol. 79, no. 4, pp. 2345–2358, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  27. J. Shu, “An authenticated key agreement protocol based on extended chaotic maps,” Acta Physica Sinica, vol. 63, no. 5, pp. 500–507, 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. M. S. Farash, M. A. Attari, and S. Kumari, “Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps,” International Journal of Communication Systems, 2014. View at Publisher · View at Google Scholar · View at Scopus
  29. F. Qu, Z. Wu, F.-Y. Wang, and W. Cho, “A security and privacy review of VANETs,” IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 6, pp. 2985–2996, 2015. View at Publisher · View at Google Scholar · View at Scopus
  30. M. S. Farash and M. A. Attari, “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps,” Nonlinear Dynamics, vol. 77, no. 1, pp. 399–411, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  31. C.-T. Li, C.-W. Lee, and J.-J. Shen, “A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service,” in Proceedings of the International Conference on Information Networking (ICOIN '15), pp. 31–36, IEEE, January 2015. View at Publisher · View at Google Scholar
  32. Y. Niu and X. Wang, “An anonymous key agreement protocol based on chaotic maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 4, pp. 1986–1992, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  33. L. Zhang, “Cryptanalysis of the public key encryption based on multiple chaotic systems,” Chaos, Solitons & Fractals, vol. 37, no. 3, pp. 669–674, 2008. View at Publisher · View at Google Scholar · View at Scopus
  34. K. Y. Cheong and T. Koshiba, “More on security of public-key cryptosystems based on Chebyshev polynomials,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 54, no. 9, pp. 795–799, 2007. View at Publisher · View at Google Scholar · View at Scopus
  35. L. Cao, Y. Luo, S. Qiu, and J. Liu, “A perturbation method to the tent map based on Lyapunov exponent and its application,” Chinese Physics B, vol. 24, no. 10, Article ID 100501, 2015. View at Publisher · View at Google Scholar
  36. L. F. Liu, H. P. Hu, and Y. S. Deng, “An analogue–digital mixed method for solving the dynamical degradation of digital chaotic systems,” IMA Journal of Mathematical Control and Information, vol. 32, no. 4, pp. 703–716, 2015. View at Publisher · View at Google Scholar
  37. V. Shoup, “Sequences of games: a tool for taming complexity in security proofs,” IACR Cryptology ePrint Archive, 2004. View at Google Scholar
  38. J. Xu, W.-T. Zhu, and D.-G. Feng, “An improved smart card based password authentication scheme with provable security,” Computer Standards and Interfaces, vol. 31, no. 4, pp. 723–728, 2009. View at Publisher · View at Google Scholar · View at Scopus
  39. E. Fujisaki and T. Okamoto, “Secure integration of asymmetric and symmetric encryption schemes,” Journal of Cryptology, vol. 26, no. 1, pp. 80–101, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus