Verifier-Based Three-Party Password-Authenticated Key Exchange with Forward Security

被引:0
|
作者
Tian Bin [1 ]
Chen Mengdong [1 ]
Liu Lianzhong [1 ]
机构
[1] Beijing Univ Aeronaut & Astronaut, Dept Comp Sci & Engn, Beijing 100191, Peoples R China
关键词
D O I
10.1109/ICCEE.2008.121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The password-based authenticated key exchange (PAKE) protocol in the three-party setting allows two clients communicating over a public network to establish a common session key with the help of a server. The fundamental security goal of PAKE is security against dictionary attacks. The protocols for verifier-based PAKE are additionally required to be secure against server compromise. In this paper, we propose a new provably verifier-based three-party PAKE protocol to solve the server compromise problem and off-line dictionary attack problem. The security of the proposed scheme has been proven in the random oracle model tinder the gap Diffie-Hellman intractability assumption. The proposed protocol is efficient both in computational cost and in communication cost when compared with previous solutions.
引用
收藏
页码:56 / 61
页数:6
相关论文
共 50 条
  • [1] Secure verifier-based three-party password-authenticated key exchange
    Pu, Qiong
    Wang, Jian
    Wu, Shuhua
    Fu, Ji
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (01) : 15 - 25
  • [2] Secure verifier-based three-party password-authenticated key exchange
    Qiong Pu
    Jian Wang
    Shuhua Wu
    Ji Fu
    [J]. Peer-to-Peer Networking and Applications, 2013, 6 : 15 - 25
  • [3] Efficient verifier-based password-authenticated key exchange in the three-party setting
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Sakurai, Kouichi
    Lee, Dong Hoon
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 513 - 520
  • [4] Improved Verifier-based Three-party Password-authenticated Key Exchange Protocol
    Zhang, Qi-Hui
    Hu, Xue-Xian
    Liu, Wen-Fen
    Wei, Jiang-Hong
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (10): : 3238 - 3250
  • [5] Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting
    Wu, Shuhua
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (03) : 1059 - 1072
  • [6] Weaknesses of a Verifier-based Password-authenticated Key Exchange Protocol in the Three-party Setting
    Pu, Qiong
    Liu, Wei
    [J]. 2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 3 - 6
  • [7] Improved Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices
    Tang, Yongli
    Li, Ying
    Zhao, Zongqu
    Zhang, Jing
    Ren, Lina
    Li, Yuanhong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] Post-quantum verifier-based three-party password authenticated key exchange protocol
    Lian H.
    Hou H.
    Zhao Y.
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (04): : 95 - 106
  • [9] Practical Password-Authenticated Three-Party Key Exchange
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Lee, Dong Hoon
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (06): : 312 - 332
  • [10] A new verifier-based anonymous password-authenticated key exchange protocol
    [J]. Wu, Tsu-Yang (wutsuyang@gmail.com), 2018, Ubiquitous International (09):