Employing Secure and Efficient Password-Authenticated Key Exchange in Wireless Networks

被引:0
|
作者
Chuang, Po-Jen [1 ]
Liao, Yi-Ping [1 ]
机构
[1] Tamkang Univ, Dept Elect & Comp Engn, Tamsui 251, Taiwan
来源
关键词
Wireless Networks; Client-to-Client Password-Authenticated Key Exchange (C2C PAKE); Cross-Realm; Smart Cards; Security Models; Performance Evaluation;
D O I
10.6180/jase.2015.18.4.12
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The password-authenticated key exchange (PAKE) is an important tool to secure wireless communications. To counter possible malicious attacks in wireless communications, this paper develops a stronger new cross-realm client-to-client (C2C) PAKE protocol based on the smart card framework agreement. Employing the client passwords, smart card information and server private keys, the new PAKE protocol works by the Mod calculation, Asymmetric encryption and Diffie-Hellman operations. It can practically enhance the security of wireless communications even when both client passwords and server private keys are snatched. To verify the performance of the new protocol, we bring in the Yoneyama's security model which can verify very intrigue attacks (including key-compromise impersonation and leakage of ephemeral private attacks) to check the security levels of existing C2C PAKE protocols and our protocol. The collected cost comparison results show that, in contrast to other protocols, our new protocol yields notably better security gain at very reasonable cost.
引用
收藏
页码:407 / 418
页数:12
相关论文
共 50 条
  • [31] A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol
    Yang, Xiaoyan
    Jiang, Han
    Xu, Qiuliang
    Hou, Mengbo
    Wei, Xiaochao
    Zhao, Minghao
    Choo, Kim-Kwang Raymond
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 670 - 677
  • [32] Revisit of Password-Authenticated Key Exchange Protocol for Healthcare Support Wireless Communication
    Kim, Mijin
    Moon, Jongho
    Won, Dongho
    Park, Namje
    ELECTRONICS, 2020, 9 (05)
  • [33] Threshold password-authenticated key exchange (extended abstract)
    MacKenzie, P
    Shrimpton, T
    Jakobsson, M
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 385 - 400
  • [34] Cryptanalysis of two password-authenticated key exchange protocols
    Wan, ZG
    Wang, SH
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 164 - 175
  • [35] ttPAKE: Typo tolerance password-authenticated key exchange
    Han, Yunxia
    Xu, Chunxiang
    Li, Shanshan
    Jiang, Changsong
    Chen, Kefei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 79
  • [36] Analysis of the SPEKE password-authenticated key exchange protocol
    Zhang, MX
    IEEE COMMUNICATIONS LETTERS, 2004, 8 (01) : 63 - 65
  • [37] Secure verifier-based three-party password-authenticated key exchange
    Pu, Qiong
    Wang, Jian
    Wu, Shuhua
    Fu, Ji
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (01) : 15 - 25
  • [38] Secure verifier-based three-party password-authenticated key exchange
    Qiong Pu
    Jian Wang
    Shuhua Wu
    Ji Fu
    Peer-to-Peer Networking and Applications, 2013, 6 : 15 - 25
  • [39] Password-Authenticated Key Exchange from Group Actions
    Abdalla, Michel
    Eisenhofer, Thorsten
    Kiltz, Eike
    Kunzweiler, Sabrina
    Riepel, Doreen
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 699 - 728
  • [40] Provably secure CL-KEM-based password-authenticated key exchange protocol
    Yang, Junhan
    Su, Bo
    Guo, Chaoping
    Han, Wenlin
    Xiao, Yang
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2017, 23 (02) : 113 - 122