Verifier-Based Three-Party Password-Authenticated Key Exchange with Forward Security

被引:0
|
作者
Tian Bin [1 ]
Chen Mengdong [1 ]
Liu Lianzhong [1 ]
机构
[1] Beijing Univ Aeronaut & Astronaut, Dept Comp Sci & Engn, Beijing 100191, Peoples R China
关键词
D O I
10.1109/ICCEE.2008.121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The password-based authenticated key exchange (PAKE) protocol in the three-party setting allows two clients communicating over a public network to establish a common session key with the help of a server. The fundamental security goal of PAKE is security against dictionary attacks. The protocols for verifier-based PAKE are additionally required to be secure against server compromise. In this paper, we propose a new provably verifier-based three-party PAKE protocol to solve the server compromise problem and off-line dictionary attack problem. The security of the proposed scheme has been proven in the random oracle model tinder the gap Diffie-Hellman intractability assumption. The proposed protocol is efficient both in computational cost and in communication cost when compared with previous solutions.
引用
下载
收藏
页码:56 / 61
页数:6
相关论文
共 50 条
  • [21] Password-based authenticated key distribution in the three-party setting with forward security
    Wu, Shuhua
    Zhu, Yuefei
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (04) : 393 - 407
  • [22] Novel Verifier-Based Three-Party Protocol for Key Exchange and Authentication
    Yang, Junhan
    Cao, Tianjie
    COMPONENTS, PACKAGING AND MANUFACTURING TECHNOLOGY, 2011, 460-461 : 231 - 236
  • [23] Password-based authenticated key exchange in the three-party setting
    Abdalla, M.
    Fouque, P.-A.
    Pointcheval, D.
    IEE Proceedings: Information Security, 2006, 153 (01): : 27 - 39
  • [24] Chaotic maps-based three-party password-authenticated key agreement scheme
    Xie, Qi
    Zhao, Jianmin
    Yu, Xiuyuan
    NONLINEAR DYNAMICS, 2013, 74 (04) : 1021 - 1027
  • [25] Password-based authenticated key exchange in the three-party setting
    Abdalla, M
    Fouque, PA
    Pointcheval, D
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 65 - 84
  • [26] Password Authenticated Key Exchange Based on RSA in the Three-Party Settings
    Dongna, E.
    Cheng, Qingfeng
    Ma, Chuangui
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 168 - 182
  • [27] Provably secure verifier-based password authenticated key exchange based on lattices
    Yu, Jinxia
    Lian, Huanhuan
    Zhao, Zongqu
    Tang, Yongli
    Wang, Xiaojun
    AI AND CLOUD COMPUTING, 2021, 120 : 121 - 156
  • [28] Secure Verifier-Based Three-Party Key Exchange in the Random Oracle Model
    Chien, Hung-Yu
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (04) : 1487 - 1501
  • [29] A novel e-mail protocol using three-party password-authenticated key exchange
    Chang, Chin-Chen
    Wu, Yu-Ching
    Chang, Shih-Chang
    SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 150 - 154
  • [30] Security analysis and enhancement for three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    Zhang, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 273 - 278