Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

被引:0
|
作者
Kwon, Jeong Ok [1 ]
Sakurai, Kouichi
Lee, Dong Hoon
机构
[1] Kyushu Univ, Dept Comp Sci & Commun Engn, Fukuoka 812, Japan
[2] Korea Univ, Ctr Info Security Tech, Seoul, South Korea
关键词
cryptography; password-authenticated key exchange; dictionary attacks; round complexity; mobile network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A password-authenticated key exchange (PAKE) protocol in the three-party setting allows two users communicating over a public network to agree on a common session key by the help of a server. In the setting the users do not share a password between themselves, but only with the server. In this paper, we explore the possibility of designing a round-efficient three-party PAKE protocol with a method to protect against undetectable on-line dictionary attacks without using the random oracle. The protocol matches the most efficient three-party PAKE protocol secure against undetectable on-line dictionary attacks among those found in the literature while providing the same level of security. Finally, we indentify the relations between detectable on-line and undetectable on-line dictionary attacks by providing counter-examples to support the observed relations(1).
引用
收藏
页码:977 / 980
页数:4
相关论文
共 50 条
  • [31] Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
    Wang, Weijia
    Hu, Lei
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 118 - +
  • [32] Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
    Wu, Shuhua
    Pu, Qiong
    Wang, Shengbao
    He, Debiao
    INFORMATION SCIENCES, 2012, 215 : 83 - 96
  • [33] A Three-Party Password Authenticated Key Exchange Protocol Resistant to Stolen Smart Card Attacks
    Chen, Chien-Ming
    Xu, Linlin
    Fang, Weicheng
    Wu, Tsu-Yang
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, 2017, 63 : 331 - 336
  • [34] Employing Secure and Efficient Password-Authenticated Key Exchange in Wireless Networks
    Chuang, Po-Jen
    Liao, Yi-Ping
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2015, 18 (04): : 407 - 418
  • [35] Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE
    Liu, Chao
    Zheng, Zhongxiang
    Jia, Keting
    You, Qidi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 56 - 72
  • [36] Authenticated key exchange secure against dictionary attacks
    Bellare, M
    Pointcheval, D
    Rogaway, P
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 139 - 155
  • [37] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho Chou
    Kuo-yu Tsai
    Tzong-chen Wu
    Kuo-hui Yeh
    Journal of Zhejiang University SCIENCE C, 2013, 14 : 347 - 355
  • [38] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chou, Chih-ho
    Tsai, Kuo-yu
    Wu, Tzong-chen
    Yeh, Kuo-hui
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (05): : 347 - 355
  • [39] Chaotic maps-based three-party password-authenticated key agreement scheme
    Xie, Qi
    Zhao, Jianmin
    Yu, Xiuyuan
    NONLINEAR DYNAMICS, 2013, 74 (04) : 1021 - 1027
  • [40] More efficient password-authenticated key exchange
    MacKenzie, P
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 361 - 377