Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

被引:0
|
作者
Kwon, Jeong Ok [1 ]
Sakurai, Kouichi
Lee, Dong Hoon
机构
[1] Kyushu Univ, Dept Comp Sci & Commun Engn, Fukuoka 812, Japan
[2] Korea Univ, Ctr Info Security Tech, Seoul, South Korea
关键词
cryptography; password-authenticated key exchange; dictionary attacks; round complexity; mobile network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A password-authenticated key exchange (PAKE) protocol in the three-party setting allows two users communicating over a public network to agree on a common session key by the help of a server. In the setting the users do not share a password between themselves, but only with the server. In this paper, we explore the possibility of designing a round-efficient three-party PAKE protocol with a method to protect against undetectable on-line dictionary attacks without using the random oracle. The protocol matches the most efficient three-party PAKE protocol secure against undetectable on-line dictionary attacks among those found in the literature while providing the same level of security. Finally, we indentify the relations between detectable on-line and undetectable on-line dictionary attacks by providing counter-examples to support the observed relations(1).
引用
收藏
页码:977 / 980
页数:4
相关论文
共 50 条
  • [1] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [2] Practical Password-Authenticated Three-Party Key Exchange
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Lee, Dong Hoon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (06): : 312 - 332
  • [3] Secure verifier-based three-party password-authenticated key exchange
    Pu, Qiong
    Wang, Jian
    Wu, Shuhua
    Fu, Ji
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (01) : 15 - 25
  • [4] Secure verifier-based three-party password-authenticated key exchange
    Qiong Pu
    Jian Wang
    Shuhua Wu
    Ji Fu
    Peer-to-Peer Networking and Applications, 2013, 6 : 15 - 25
  • [5] Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Kim, Moonseong
    Paik, Juryon
    Won, Dongho
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3244 - 3260
  • [6] Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
    Chen, Hsing-Bai
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chang, Chin-Chen
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (1-2) : 95 - 99
  • [7] Efficient verifier-based password-authenticated key exchange in the three-party setting
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Sakurai, Kouichi
    Lee, Dong Hoon
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 513 - 520
  • [8] Universally composable three-party password-authenticated key exchange with contributiveness
    Hu, Xuexian
    Zhang, Zhenfeng
    Zhang, Qihui
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (06) : 1100 - 1111
  • [9] THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES
    Yi, Xun
    Tso, Raylin
    Okamoto, Eiji
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 15 - 24
  • [10] A secure and efficient three-party password-based authenticated key exchange protocol
    He, Yong-Zhong
    Cai, Ying
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 280 - +