A new verifier-based anonymous password-authenticated key exchange protocol

被引:0
|
作者
机构
[1] Chen, Chien-Ming
[2] Wang, Guangjie
[3] Fang, Weicheng
[4] 2,3,Wu, Tsu-Yang
来源
Wu, Tsu-Yang (wutsuyang@gmail.com) | 2018年 / Ubiquitous International卷 / 09期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In the information age, privacy have aroused wide concern. User identity can be tracked in a public network if it is not stored or transmitted in a secure way. To enhance the security, many anonymous password authenticated key exchange protocols have been proposed to anonymize user’s identity from the server. However, few of them focus on the stolen verifier attacks which assumes a powerful adversary who is accessible to the server’s database or even secret keys. In this paper, we propose a new verifier-based anonymous password-authenticated key exchange protocols. It employs an existed algebraic MAC as verifier to resist such attacks. We also show that the protocol is secure and efficient through analysis. © 2018 Ubiquitous International. All rights reserved.
引用
收藏
相关论文
共 50 条
  • [41] Anonymous Password Authenticated Key Exchange Protocol in the Standard Model
    Xuexian Hu
    Jiang Zhang
    Zhenfeng Zhang
    Fengmei Liu
    Wireless Personal Communications, 2017, 96 : 1451 - 1474
  • [42] Smart Grid Multilayer Consensus Password-Authenticated Key Exchange Protocol
    Nicanfar, Hasen
    Leung, Victor C. M.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [43] Security of the J-PAKE Password-Authenticated Key Exchange Protocol
    Abdalla, Michel
    Benhamouda, Fabrice
    MacKenzie, Philip
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 571 - 587
  • [44] A Secure Two-Party Password-Authenticated Key Exchange Protocol
    Saeed, Maryam
    Shahhoseini, Hadi Shahriar
    Mackvandi, Ali
    Rezaeinezhad, Mohammad Reza
    Naddafiun, Mansour
    Bidoki, Mohammad Zare
    2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2014, : 466 - 474
  • [45] EFFICIENT VERIFIER-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL FOR THREE PARTIES
    Wu, Tzong-Sun
    Lin, Han-Yu
    Hsu, Chien-Lung
    Chang, Kuo-Yi
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (02): : 755 - 762
  • [46] More efficient password-authenticated key exchange
    MacKenzie, P
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 361 - 377
  • [47] Faster and shorter password-authenticated key exchange
    Gennaro, Rosario
    THEORY OF CRYPTOGRAPHY, 2008, 4948 : 589 - 606
  • [48] Provably secure CL-KEM-based password-authenticated key exchange protocol
    Yang, Junhan
    Su, Bo
    Guo, Chaoping
    Han, Wenlin
    Xiao, Yang
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2017, 23 (02) : 113 - 122
  • [49] Anonymous password-based authenticated key exchange
    Viet, DQ
    Yamamura, A
    Tanaka, H
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 244 - 257
  • [50] RSA-based Password-Authenticated Key Exchange, revisited
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1424 - 1438