An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards

被引:0
|
作者
Jin, Wenting [1 ]
Xu, Jing [2 ]
机构
[1] Grad Univ Chinese Acad Sci, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Software, State Key Lab Informat Secu, Beijing, Peoples R China
关键词
Passwold-authenticated key agreement; Cross-realm; Client-to-client; Smart cards; Provable security; EXCHANGE; CRYPTANALYSIS; SCHEME;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cross-realm client-to-client password-authenticated key agreement (C2C-PAKA) protocols provide an authenticated key exchange between two clients of different realms, who only share their passwords with their own servers. Recently, several such cross-realm C2C-PAKA protocols have been suggested in the private-key (symmetric) setting, but all of these protocols are found to be vulnerable to password-compromise impersonation attacks. In this paper, we propose our innovative C2C- PAKA-SC protocol in which smart cards are first utilized in the cross-realm setting so that it can resist all types of common attacks including password-compromise impersonation attacks and provide improved efficiency. Moveover, we modify the original formal security model to adapt our proposed protocol and present a corresponding security proof.
引用
收藏
页码:299 / +
页数:4
相关论文
共 50 条
  • [41] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [42] Provably secure threshold password-authenticated key exchange extended abstract
    Di Raimondo, M
    Gennaro, R
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 507 - 523
  • [43] Provably secure quantum resistance two-server password-authenticated key exchange protocol
    Yin A.
    Guo Y.
    Wang D.
    Qu T.
    Chen L.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (03): : 14 - 29
  • [44] Comments on Chaotic Maps-based Password-authenticated Key Agreement Using Smart Cards
    Chang, Ya-Fen
    Tai, Wei-Liang
    Wu, Wei-Na
    Li, Wei-Han
    Chen, Yung-Chi
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 94 - 97
  • [45] Improved chaotic maps-based password-authenticated key agreement using smart cards
    Lin, Han-Yu
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 20 (02) : 482 - 488
  • [46] Provably secure and efficient certificateless authenticated tripartite key agreement protocol
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1213 - 1221
  • [47] A secure threshold anonymous password-authenticated key exchange protocol
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 444 - +
  • [48] Provably secure password-authenticated key exchange using Diffie-Hellman
    Boyko, V
    MacKenzie, P
    Patel, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 156 - 171
  • [49] Password authenticated key agreement with smart cards for remote systems
    Tang, Anyang
    Xu, Chunxiang
    2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 484 - +
  • [50] Efficient and provably secure password-based group key agreement protocol
    Zheng, Ming-Hui
    Zhou, Hui-Hua
    Li, Jun
    Cui, Guo-Hua
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 948 - 953