An Efficient Two-Server Authentication and Key Exchange Protocol

被引:2
|
作者
Chattaraj, Durbadal [1 ]
Sarma, Monalisa [1 ]
Samanta, Debasis [2 ]
机构
[1] IIT Kharagpur, Subir Chowdhury Sch Qual & Reliabil, Kharagpur, W Bengal, India
[2] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur, W Bengal, India
关键词
key agreement; authentication protocol; user privacy; data security;
D O I
10.1109/ICTCS.2017.32
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To avail networked services via insecure channel, it is necessary to establish a symmetric key between two parties. In such a provision, both the end parties demand proper auditing so that resources are legitimately used, and privacies are maintained. To achieve this, there is a need for a robust authentication mechanism. Towards the solution, a number of password-based Diffie-Hellman authentication and key exchange protocols have been reported recently. However, they are vulnerable to many security threats such as manin-the-middle, replay, byzantine, dictionary attacks, etc. This work proposes a password-based two-server authentication and key exchange protocol addressing the major limitations in the existing protocols. The security analysis substantiate that the proposed scheme is provably secure and successfully addressed the existing issues. The performance study contemplates that the overhead of the protocol is reasonable and comparable with other schemes. The proposed protocol can be considered as a robust authentication protocol for a secure access to Cloud services.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 50 条
  • [1] A robust finger print based two-server authentication and key exchange system
    Mukesh, Rajeswari
    Damodaram, A.
    Bharathi, V. Subbiah
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEM SOFTWARE AND MIDDLEWARE AND WORKSHOPS, VOLS 1 AND 2, 2008, : 167 - +
  • [2] A practical password-based two-server authentication and key exchange system
    Yang, YJ
    Deng, RH
    Bao, F
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (02) : 105 - 114
  • [3] Efficient Two-Server Password-Only Authenticated Key Exchange
    Yi, Xun
    Ling, San
    Wang, Huaxiong
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (09) : 1773 - 1782
  • [4] A new two-server authentication and key agreement protocol for accessing secure cloud services
    Chattaraj, Durbadal
    Sarma, Monalisa
    Das, Ashok Kumar
    [J]. COMPUTER NETWORKS, 2018, 131 : 144 - 164
  • [5] Privacy Preserving Two-Server Diffie-Hellman Key Exchange Protocol
    Chattaraj, Durbadal
    Sarma, Monalisa
    Samanta, Debasis
    [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 51 - 58
  • [6] An efficient password-only two-server authenticated key exchange system
    Jin, Haimin
    Wong, Duncan S.
    Xu, Yinlong
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 44 - +
  • [7] Proofs for two-server password authentication
    Szydlo, M
    Kaliski, B
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 227 - 244
  • [8] Two-server password-only authenticated key exchange
    Katz, J
    MacKenzie, P
    Taban, G
    Gligor, V
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 : 1 - 16
  • [9] Two-server password-only authenticated key exchange
    Katz, Jonathan
    MacKenzie, Philip
    Taban, Gelareh
    Gligor, Virgil
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (02) : 651 - 669
  • [10] Provably secure quantum resistance two-server password-authenticated key exchange protocol
    Yin A.
    Guo Y.
    Wang D.
    Qu T.
    Chen L.
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (03): : 14 - 29