A new verifier-based anonymous password-authenticated key exchange protocol

被引:0
|
作者
机构
[1] Chen, Chien-Ming
[2] Wang, Guangjie
[3] Fang, Weicheng
[4] 2,3,Wu, Tsu-Yang
来源
Wu, Tsu-Yang (wutsuyang@gmail.com) | 2018年 / Ubiquitous International卷 / 09期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In the information age, privacy have aroused wide concern. User identity can be tracked in a public network if it is not stored or transmitted in a secure way. To enhance the security, many anonymous password authenticated key exchange protocols have been proposed to anonymize user’s identity from the server. However, few of them focus on the stolen verifier attacks which assumes a powerful adversary who is accessible to the server’s database or even secret keys. In this paper, we propose a new verifier-based anonymous password-authenticated key exchange protocols. It employs an existed algebraic MAC as verifier to resist such attacks. We also show that the protocol is secure and efficient through analysis. © 2018 Ubiquitous International. All rights reserved.
引用
收藏
相关论文
共 50 条
  • [1] Verifier-based anonymous password-authenticated key exchange protocol in the standard model
    Zhang, Qihui
    Chaudhary, Pradeep
    Kumari, Saru
    Kong, Zhiyin
    Liu, Wenfen
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 3623 - 3640
  • [2] A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol
    Yang, Xiaoyan
    Jiang, Han
    Xu, Qiuliang
    Hou, Mengbo
    Wei, Xiaochao
    Zhao, Minghao
    Choo, Kim-Kwang Raymond
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 670 - 677
  • [3] Verifier-based Password-Authenticated Key Exchange Protocol in Cross-Realm Setting
    Liu, Xiumei
    Zhou, Fucai
    Chang, Guiran
    CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 5560 - 5563
  • [4] Improved Verifier-based Three-party Password-authenticated Key Exchange Protocol
    Zhang, Qi-Hui
    Hu, Xue-Xian
    Liu, Wen-Fen
    Wei, Jiang-Hong
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (10): : 3238 - 3250
  • [5] Weaknesses of a Verifier-based Password-authenticated Key Exchange Protocol in the Three-party Setting
    Pu, Qiong
    Liu, Wei
    2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 3 - 6
  • [6] Secure verifier-based three-party password-authenticated key exchange
    Pu, Qiong
    Wang, Jian
    Wu, Shuhua
    Fu, Ji
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (01) : 15 - 25
  • [7] Secure verifier-based three-party password-authenticated key exchange
    Qiong Pu
    Jian Wang
    Shuhua Wu
    Ji Fu
    Peer-to-Peer Networking and Applications, 2013, 6 : 15 - 25
  • [8] Efficient verifier-based password-authenticated key exchange in the three-party setting
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Sakurai, Kouichi
    Lee, Dong Hoon
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 513 - 520
  • [9] One-round protocol for two-party verifier-based password-authenticated key exchange
    Kwon, Jeong Ok
    Sakurai, Kouichi
    Lee, Dong Hoon
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 87 - 96
  • [10] Verifier-Based Three-Party Password-Authenticated Key Exchange with Forward Security
    Tian Bin
    Chen Mengdong
    Liu Lianzhong
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 56 - 61