An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards

被引:0
|
作者
Jin, Wenting [1 ]
Xu, Jing [2 ]
机构
[1] Grad Univ Chinese Acad Sci, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Software, State Key Lab Informat Secu, Beijing, Peoples R China
关键词
Passwold-authenticated key agreement; Cross-realm; Client-to-client; Smart cards; Provable security; EXCHANGE; CRYPTANALYSIS; SCHEME;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cross-realm client-to-client password-authenticated key agreement (C2C-PAKA) protocols provide an authenticated key exchange between two clients of different realms, who only share their passwords with their own servers. Recently, several such cross-realm C2C-PAKA protocols have been suggested in the private-key (symmetric) setting, but all of these protocols are found to be vulnerable to password-compromise impersonation attacks. In this paper, we propose our innovative C2C- PAKA-SC protocol in which smart cards are first utilized in the cross-realm setting so that it can resist all types of common attacks including password-compromise impersonation attacks and provide improved efficiency. Moveover, we modify the original formal security model to adapt our proposed protocol and present a corresponding security proof.
引用
收藏
页码:299 / +
页数:4
相关论文
共 50 条
  • [31] An Efficient Provably Secure Password-Based Authenticated Key Agreement
    Xu, Hanqiu
    Wang, Qingping
    Zhou, Jing
    Ruan, Ou
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 423 - 434
  • [32] Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
    Wei-Chuen Yau
    Raphael C.-W. Phan
    Nonlinear Dynamics, 2015, 79 : 809 - 821
  • [33] Provably secure three-party authenticated key agreement protocol using smart cards
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    Fu, Xiaoming
    Liu, Hao
    Vasilakos, Athanasios V.
    COMPUTER NETWORKS, 2014, 58 : 29 - 38
  • [34] A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol
    Yang, Xiaoyan
    Jiang, Han
    Xu, Qiuliang
    Hou, Mengbo
    Wei, Xiaochao
    Zhao, Minghao
    Choo, Kim-Kwang Raymond
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 670 - 677
  • [35] Provably secure CL-KEM-based password-authenticated key exchange protocol
    Yang, Junhan
    Su, Bo
    Guo, Chaoping
    Han, Wenlin
    Xiao, Yang
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2017, 23 (02) : 113 - 122
  • [36] Chaotic maps-based password-authenticated key agreement using smart cards
    Guo, Cheng
    Chang, Chin-Chen
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (06) : 1433 - 1440
  • [37] Security of efficient password authenticated key agreement using smart cards
    Shieh, Wen-Gong
    WSEAS Transactions on Information Science and Applications, 2006, 3 (01): : 187 - 191
  • [39] A Simple Balanced Password-Authenticated Key Agreement Protocol
    Liu, Fuwen
    Koenig, Hartmut
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 403 - 408
  • [40] Efficient provably secure password-based explicit authenticated key agreement
    Ruan, Ou
    Kumar, Neeraj
    He, Debiao
    Lee, Jong-Hyouk
    PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 50 - 60