Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

被引:0
|
作者
Kwon, Jeong Ok [1 ]
Sakurai, Kouichi
Lee, Dong Hoon
机构
[1] Kyushu Univ, Dept Comp Sci & Commun Engn, Fukuoka 812, Japan
[2] Korea Univ, Ctr Info Security Tech, Seoul, South Korea
关键词
cryptography; password-authenticated key exchange; dictionary attacks; round complexity; mobile network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A password-authenticated key exchange (PAKE) protocol in the three-party setting allows two users communicating over a public network to agree on a common session key by the help of a server. In the setting the users do not share a password between themselves, but only with the server. In this paper, we explore the possibility of designing a round-efficient three-party PAKE protocol with a method to protect against undetectable on-line dictionary attacks without using the random oracle. The protocol matches the most efficient three-party PAKE protocol secure against undetectable on-line dictionary attacks among those found in the literature while providing the same level of security. Finally, we indentify the relations between detectable on-line and undetectable on-line dictionary attacks by providing counter-examples to support the observed relations(1).
引用
收藏
页码:977 / 980
页数:4
相关论文
共 50 条
  • [21] A communication-efficient three-party password authenticated key exchange protocol
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Wei-Pang
    INFORMATION SCIENCES, 2011, 181 (01) : 217 - 226
  • [22] A Secure Two-Party Password-Authenticated Key Exchange Protocol
    Saeed, Maryam
    Shahhoseini, Hadi Shahriar
    Mackvandi, Ali
    Rezaeinezhad, Mohammad Reza
    Naddafiun, Mansour
    Bidoki, Mohammad Zare
    2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2014, : 466 - 474
  • [23] Efficient three-party password-based authenticated key exchange protocol
    Xu, C.-X., 1600, Univ. of Electronic Science and Technology of China (41):
  • [24] A novel e-mail protocol using three-party password-authenticated key exchange
    Chang, Chin-Chen
    Wu, Yu-Ching
    Chang, Shih-Chang
    SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 150 - 154
  • [25] Anonymous Three-Party Password-Authenticated Key Exchange Scheme for Telecare Medical Information Systems
    Xie, Qi
    Hu, Bin
    Dong, Na
    Wong, Duncan S.
    PLOS ONE, 2014, 9 (07):
  • [26] Provably secure three-party password authenticated key exchange protocol in the standard model
    Yang, Jun-Han
    Cao, Tian-Jie
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (02) : 340 - 350
  • [27] Provably secure three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    INFORMATION SCIENCES, 2012, 184 (01) : 310 - 323
  • [28] Simple three-party password authenticated key exchange protocol
    Lo N.-W.
    Yeh K.-H.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 600 - 603
  • [29] Simple Three-Party Password Authenticated Key Exchange Protocol
    罗乃维
    叶国晖
    JournalofShanghaiJiaotongUniversity(Science), 2011, 16 (05) : 600 - 603
  • [30] Universally Composable Three-Party Password Authenticated Key Exchange
    Zhang, Qihui
    Hu, Xuexian
    Wei, Jianghong
    Liu, Wenfen
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 123 - 137