Employing Secure and Efficient Password-Authenticated Key Exchange in Wireless Networks

被引:0
|
作者
Chuang, Po-Jen [1 ]
Liao, Yi-Ping [1 ]
机构
[1] Tamkang Univ, Dept Elect & Comp Engn, Tamsui 251, Taiwan
来源
关键词
Wireless Networks; Client-to-Client Password-Authenticated Key Exchange (C2C PAKE); Cross-Realm; Smart Cards; Security Models; Performance Evaluation;
D O I
10.6180/jase.2015.18.4.12
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The password-authenticated key exchange (PAKE) is an important tool to secure wireless communications. To counter possible malicious attacks in wireless communications, this paper develops a stronger new cross-realm client-to-client (C2C) PAKE protocol based on the smart card framework agreement. Employing the client passwords, smart card information and server private keys, the new PAKE protocol works by the Mod calculation, Asymmetric encryption and Diffie-Hellman operations. It can practically enhance the security of wireless communications even when both client passwords and server private keys are snatched. To verify the performance of the new protocol, we bring in the Yoneyama's security model which can verify very intrigue attacks (including key-compromise impersonation and leakage of ephemeral private attacks) to check the security levels of existing C2C PAKE protocols and our protocol. The collected cost comparison results show that, in contrast to other protocols, our new protocol yields notably better security gain at very reasonable cost.
引用
收藏
页码:407 / 418
页数:12
相关论文
共 50 条
  • [1] More efficient password-authenticated key exchange
    MacKenzie, P
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 361 - 377
  • [2] A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks
    He, Daojing
    Chen, Chun
    Ma, Maode
    Chan, Sammy
    Bu, Jiajun
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (04) : 495 - 504
  • [3] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001
  • [4] Provably Secure Quantum Resistance Efficient Password-Authenticated Key Exchange Protocol
    Yin A.-Q.
    Wang D.
    Guo Y.-B.
    Chen L.
    Tang D.
    Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (11): : 2321 - 2336
  • [5] Password-authenticated key exchange using efficient MACs
    Strangio, Maurizio A.
    JOURNAL OF COMPUTERS, 2006, 1 (08) : 27 - 35
  • [6] Efficient password-authenticated key exchange based on RSA
    Park, Sangjoon
    Nam, Junghyun
    Kim, Seungjoo
    Won, Dongho
    TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 309 - +
  • [7] A secure threshold anonymous password-authenticated key exchange protocol
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 444 - +
  • [8] A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (11) : 3312 - 3324
  • [9] An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks
    Li, Wenmin
    Wen, Qiaoyan
    Su, Qi
    Jin, Zhengping
    Wang, Yanjiong
    AD HOC & SENSOR WIRELESS NETWORKS, 2012, 16 (1-3) : 29 - 44
  • [10] A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS
    Lo, Jung-Wen
    Lin, Shu-Chen
    Hwang, Min-Shiang
    INFORMATION TECHNOLOGY AND CONTROL, 2010, 39 (02): : 146 - 151