Bayat et al., 2017 - Google Patents
A secure and efficient chaotic maps based authenticated key-exchange protocol for smart gridBayat et al., 2017
- Document ID
- 16443433943429331693
- Author
- Bayat M
- Atashgah M
- Aref M
- Publication year
- Publication venue
- Wireless Personal Communications
External Links
Snippet
Nicanfar and Leung proposed a multilayer consensus elliptic curve based password authenticated key-exchange (MCEPAK) protocol for smart grid. They claimed that their protocol is secure against possible attacks. In this paper, we show that the MCEPAK protocol …
- 230000000739 chaotic 0 title abstract description 43
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lee et al. | A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps | |
| Xie et al. | Chaotic maps-based three-party password-authenticated key agreement scheme | |
| Tan | A chaotic maps-based authenticated key agreement protocol with strong anonymity | |
| Farash et al. | Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing | |
| Hsieh et al. | Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks | |
| Xiong et al. | A novel multiserver authentication scheme using proxy resignature with scalability and strong user anonymity | |
| Odelu et al. | A secure anonymity preserving authentication scheme for roaming service in global mobility networks | |
| Luo et al. | A security communication model based on certificateless online/offline signcryption for Internet of Things | |
| Xu et al. | PPLS: a privacy-preserving location-sharing scheme in mobile online social networks | |
| Bayat et al. | A secure and efficient chaotic maps based authenticated key-exchange protocol for smart grid | |
| Sarhan et al. | An approach to identity management in clouds without trusted third parties | |
| Peng et al. | Efficient distributed decryption scheme for IoT gateway-based applications | |
| Ogundoyin et al. | EDAS: Efficient data aggregation scheme for Internet of Things | |
| Ming et al. | Proxy signcryption scheme in the standard model | |
| Baccouri et al. | Lightweight authentication scheme based on elliptic curve el gamal | |
| Song et al. | Hardening password-based credential databases | |
| Patonico et al. | Elliptic curve‐based proxy re‐signcryption scheme for secure data storage on the cloud | |
| Shakiba | Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks | |
| Jabbari et al. | A revised key agreement protocol based on chaotic maps | |
| Li et al. | A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service | |
| Ding et al. | Efficient authentication and key agreement protocol with anonymity for delay tolerant networks | |
| Doshi | An enhanced approach for CP-ABE with proxy re-encryption in IoT paradigm | |
| Lee | Efficient three-party authenticated key agreements based on Chebyshev chaotic map-based Diffie–Hellman assumption | |
| Zhang et al. | Privacy‐friendly weighted‐reputation aggregation protocols against malicious adversaries in cloud services | |
| Al-Attab et al. | Authentication scheme for insecure networks in cloud computing |