Verifier-Based Three-Party Password-Authenticated Key Exchange with Forward Security

被引:0
|
作者
Tian Bin [1 ]
Chen Mengdong [1 ]
Liu Lianzhong [1 ]
机构
[1] Beijing Univ Aeronaut & Astronaut, Dept Comp Sci & Engn, Beijing 100191, Peoples R China
关键词
D O I
10.1109/ICCEE.2008.121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The password-based authenticated key exchange (PAKE) protocol in the three-party setting allows two clients communicating over a public network to establish a common session key with the help of a server. The fundamental security goal of PAKE is security against dictionary attacks. The protocols for verifier-based PAKE are additionally required to be secure against server compromise. In this paper, we propose a new provably verifier-based three-party PAKE protocol to solve the server compromise problem and off-line dictionary attack problem. The security of the proposed scheme has been proven in the random oracle model tinder the gap Diffie-Hellman intractability assumption. The proposed protocol is efficient both in computational cost and in communication cost when compared with previous solutions.
引用
下载
收藏
页码:56 / 61
页数:6
相关论文
共 50 条
  • [11] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [12] Verifier-based anonymous password-authenticated key exchange protocol in the standard model
    Zhang, Qihui
    Chaudhary, Pradeep
    Kumari, Saru
    Kong, Zhiyin
    Liu, Wenfen
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 3623 - 3640
  • [13] ECC-Based Password-Authenticated Key Exchange in the Three-Party Setting
    Liu, Tingting
    Pu, Qiong
    Zhao, Yong
    Wu, Shuhua
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08): : 2069 - 2077
  • [14] ECC-Based Password-Authenticated Key Exchange in the Three-Party Setting
    Tingting Liu
    Qiong Pu
    Yong Zhao
    Shuhua Wu
    Arabian Journal for Science and Engineering, 2013, 38 : 2069 - 2077
  • [15] One-round protocol for two-party verifier-based password-authenticated key exchange
    Kwon, Jeong Ok
    Sakurai, Kouichi
    Lee, Dong Hoon
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 87 - 96
  • [16] Universally composable three-party password-authenticated key exchange with contributiveness
    Hu, Xuexian
    Zhang, Zhenfeng
    Zhang, Qihui
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (06) : 1100 - 1111
  • [17] THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES
    Yi, Xun
    Tso, Raylin
    Okamoto, Eiji
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 15 - 24
  • [18] A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware
    Shin, Ji Sun
    Jo, Minjae
    Hwang, Jung Yeon
    Lee, Jaehwan
    COMPUTER JOURNAL, 2021, 64 (08): : 1293 - 1302
  • [19] Verifier-based Password-Authenticated Key Exchange Protocol in Cross-Realm Setting
    Liu, Xiumei
    Zhou, Fucai
    Chang, Guiran
    CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 5560 - 5563
  • [20] A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol
    Yang, Xiaoyan
    Jiang, Han
    Xu, Qiuliang
    Hou, Mengbo
    Wei, Xiaochao
    Zhao, Minghao
    Choo, Kim-Kwang Raymond
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 670 - 677