Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
IEEE/ACM Transactions on Networking (TON)
Improving the security of 'a flexible biometrics remote user authentication scheme'
Computer Standards & Interfaces
A novel key agreement protocol based on chaotic maps
Information Sciences: an International Journal
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
Information Sciences: an International Journal
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
Information Sciences: an International Journal
New directions in cryptography
IEEE Transactions on Information Theory
Information Sciences: an International Journal
Coupled map lattice based hash function with collision resistance in single-iteration computation
Information Sciences: an International Journal
Randomness criteria in binary visibility graph and complex network perspective
Information Sciences: an International Journal
Information Sciences: an International Journal
Keyed hash function based on a dynamic lookup table of functions
Information Sciences: an International Journal
Secure chaotic system with application to chaotic ciphers
Information Sciences: an International Journal
Cryptanalysis of a key agreement protocol based on chaotic Hash
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.07 |
Recently, Xiao et al. proposed an improved key agreement protocol based on chaotic maps, in which only a predetermined long-term key is utilized to ensure its security. This paper demonstrates that none of these schemes can satisfy the contributory nature of key agreement. To fill the gaps, we present a secure key agreement protocol based on chaotic Hash. The proposed scheme utilizes the chaotic Hash function to achieve the contributory nature and enhance its security. Cryptanalysis demonstrates that our chaotic Hash-based scheme can overcome all the current deficiencies.