Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
395080 | Information Sciences | 2010 | 6 Pages |
Abstract
Recently, Xiao et al. proposed an improved key agreement protocol based on chaotic maps, in which only a predetermined long-term key is utilized to ensure its security. This paper demonstrates that none of these schemes can satisfy the contributory nature of key agreement. To fill the gaps, we present a secure key agreement protocol based on chaotic Hash. The proposed scheme utilizes the chaotic Hash function to achieve the contributory nature and enhance its security. Cryptanalysis demonstrates that our chaotic Hash-based scheme can overcome all the current deficiencies.
Related Topics
Physical Sciences and Engineering
Computer Science
Artificial Intelligence
Authors
Xianfeng Guo, Jiashu Zhang,