A new verifier-based anonymous password-authenticated key exchange protocol

被引:0
|
作者
机构
[1] Chen, Chien-Ming
[2] Wang, Guangjie
[3] Fang, Weicheng
[4] 2,3,Wu, Tsu-Yang
来源
Wu, Tsu-Yang (wutsuyang@gmail.com) | 2018年 / Ubiquitous International卷 / 09期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In the information age, privacy have aroused wide concern. User identity can be tracked in a public network if it is not stored or transmitted in a secure way. To enhance the security, many anonymous password authenticated key exchange protocols have been proposed to anonymize user’s identity from the server. However, few of them focus on the stolen verifier attacks which assumes a powerful adversary who is accessible to the server’s database or even secret keys. In this paper, we propose a new verifier-based anonymous password-authenticated key exchange protocols. It employs an existed algebraic MAC as verifier to resist such attacks. We also show that the protocol is secure and efficient through analysis. © 2018 Ubiquitous International. All rights reserved.
引用
收藏
相关论文
共 50 条
  • [21] Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
    Abdalla, Michel
    Izabachene, Malika
    Pointcheval, David
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 133 - 148
  • [22] A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (11) : 3312 - 3324
  • [23] Analysis of the SPEKE password-authenticated key exchange protocol
    Zhang, MX
    IEEE COMMUNICATIONS LETTERS, 2004, 8 (01) : 63 - 65
  • [24] Password-authenticated key exchange based on RSA
    MacKenzie, Philip
    Patel, Sarvar
    Swaminathan, Ram
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (06) : 387 - 410
  • [25] A novel verifier-based authenticated key agreement protocol
    Ma, Chunbo
    Ao, Jun
    Li, Jianhua
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2007, 2 : 1044 - +
  • [26] Password-authenticated key exchange based on RSA
    Philip MacKenzie
    Sarvar Patel
    Ram Swaminathan
    International Journal of Information Security, 2010, 9 : 387 - 410
  • [27] Password-authenticated key exchange based on RSA
    MacKenzie, P
    Patel, S
    Swaminathan, R
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 599 - 613
  • [28] Research on password-authenticated key exchange protocol over lattices
    Guo Y.
    Yin A.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (12): : 172 - 187
  • [29] A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS
    Lo, Jung-Wen
    Lin, Shu-Chen
    Hwang, Min-Shiang
    INFORMATION TECHNOLOGY AND CONTROL, 2010, 39 (02): : 146 - 151
  • [30] A general compiler for password-authenticated group key exchange protocol
    Li, Hui
    Wu, Chuan-Kun
    Sun, Jun
    INFORMATION PROCESSING LETTERS, 2010, 110 (04) : 160 - 167