Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps.
Yu ChenChien-Ming ChenJeng-Shyang PanTsu-Yang WuShuai LiuPublished in: J. Inf. Hiding Multim. Signal Process. (2016)
Keyphrases
- password based authenticated key exchange
- diffie hellman
- chaotic maps
- image encryption scheme
- image encryption
- key exchange
- encryption scheme
- security analysis
- authentication scheme
- encryption algorithm
- public key
- elliptic curve
- security properties
- standard model
- secret key
- private key
- key management
- secure communication
- information security
- group communication
- key distribution
- security requirements
- pseudorandom
- access control
- secret sharing scheme
- authentication protocol
- chaotic sequence
- image encryption algorithm
- security policies
- network security
- intrusion detection