Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

被引:0
|
作者
Kwon, Jeong Ok [1 ]
Sakurai, Kouichi
Lee, Dong Hoon
机构
[1] Kyushu Univ, Dept Comp Sci & Commun Engn, Fukuoka 812, Japan
[2] Korea Univ, Ctr Info Security Tech, Seoul, South Korea
关键词
cryptography; password-authenticated key exchange; dictionary attacks; round complexity; mobile network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A password-authenticated key exchange (PAKE) protocol in the three-party setting allows two users communicating over a public network to agree on a common session key by the help of a server. In the setting the users do not share a password between themselves, but only with the server. In this paper, we explore the possibility of designing a round-efficient three-party PAKE protocol with a method to protect against undetectable on-line dictionary attacks without using the random oracle. The protocol matches the most efficient three-party PAKE protocol secure against undetectable on-line dictionary attacks among those found in the literature while providing the same level of security. Finally, we indentify the relations between detectable on-line and undetectable on-line dictionary attacks by providing counter-examples to support the observed relations(1).
引用
收藏
页码:977 / 980
页数:4
相关论文
共 50 条
  • [41] Password-based authenticated key exchange in the three-party setting
    Abdalla, M.
    Fouque, P.-A.
    Pointcheval, D.
    IEE Proceedings: Information Security, 2006, 153 (01): : 27 - 39
  • [42] Password Authenticated Key Exchange Based on RSA in the Three-Party Settings
    Dongna, E.
    Cheng, Qingfeng
    Ma, Chuangui
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 168 - 182
  • [43] Password-based authenticated key exchange in the three-party setting
    Abdalla, M
    Fouque, PA
    Pointcheval, D
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 65 - 84
  • [44] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001
  • [45] Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting
    Wu, Shuhua
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (03) : 1059 - 1072
  • [46] Chaotic maps-based three-party password-authenticated key agreement scheme
    Qi Xie
    Jianmin Zhao
    Xiuyuan Yu
    Nonlinear Dynamics, 2013, 74 : 1021 - 1027
  • [47] A new secure three-party authenticated key exchange protocol
    Xi'an Communications Institute, Xi'an 710106, Shannxi, China
    Int. Rev. Comput. Softw., 7 (3633-3638):
  • [48] Improved Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices
    Tang, Yongli
    Li, Ying
    Zhao, Zongqu
    Zhang, Jing
    Ren, Lina
    Li, Yuanhong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [49] Provably Secure Quantum Resistance Efficient Password-Authenticated Key Exchange Protocol
    Yin A.-Q.
    Wang D.
    Guo Y.-B.
    Chen L.
    Tang D.
    Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (11): : 2321 - 2336
  • [50] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chen, Chien-Ming
    Wang, King-Hang
    Yeh, Kuo-Hui
    Xiang, Bin
    Wu, Tsu-Yang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) : 3133 - 3142