Efficient three-party password-based key exchange scheme

被引:27
|
作者
Lou, Der-Chyuan [2 ]
Huang, Hui-Feng [1 ]
机构
[1] Natl Taichung Inst Technol, Dept Comp Sci & Informat Engn, Taichung 404, Taiwan
[2] Chang Gung Univ, Dept Comp Sci & Informat Engn, Tao Yuan 33302, Taiwan
关键词
password; ECC; key exchange; three-party key exchange; SERVER PUBLIC-KEYS; AGREEMENT PROTOCOLS; CRYPTOSYSTEMS; CRYPTOGRAPHY;
D O I
10.1002/dac.1172
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In three-party password-based key exchange protocol, a client is allowed to share a human-memorable password with a trusted server such that two clients can negotiate a session key to communicate with each other secretly. Recently, many three-party password-based key exchange protocols have been developed. However, these proposed schemes cannot simultaneously achieve security and efficiency. Based on elliptic curve cryptography (ECC), this paper will propose a new simple three-party password-based authenticated key exchange scheme. The proposed method not only reduces computation cost for remote users and a trusted server but also is more efficient than previously proposed schemes. It is better suited for resource constrained devices, such as smart cards or mobile units. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:504 / 512
页数:9
相关论文
共 50 条
  • [31] Re-attack on a three-party password-based authenticated key exchange protocol
    Liang, Haiquan
    Hu, Jingtai
    Wu, Shuhua
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (5-6) : 1175 - 1183
  • [32] Provably leakage-resilient three-party password-based authenticated key exchange
    Ruan, Ou
    Wang, Qingping
    Wang, Zihao
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (01) : 163 - 173
  • [33] Security analysis and enhancement for three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    Zhang, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 273 - 278
  • [34] Provably leakage-resilient three-party password-based authenticated key exchange
    Ou Ruan
    Qingping Wang
    Zihao Wang
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 163 - 173
  • [35] Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE
    Liu, Chao
    Zheng, Zhongxiang
    Jia, Keting
    You, Qidi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 56 - 72
  • [36] Provably Secure Password-based Three-party Key Exchange Protocol with Computation Efficiency
    Fu, Jih-Ming
    Lin, Jeng-Ping
    Wang, Ren-Chiun
    LIFE SCIENCE JOURNAL-ACTA ZHENGZHOU UNIVERSITY OVERSEAS EDITION, 2011, 8 (04): : 394 - 401
  • [37] A method for making three-party password-based key exchange resilient to server compromise
    Zhu Hongfeng
    Liu Tianhua
    Re, Liu
    Chang Guiran
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 546 - +
  • [38] An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    NONLINEAR DYNAMICS, 2014, 77 (1-2) : 399 - 411
  • [39] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chen, Chien-Ming
    Wang, King-Hang
    Yeh, Kuo-Hui
    Xiang, Bin
    Wu, Tsu-Yang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) : 3133 - 3142
  • [40] An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
    Mohammad Sabzinejad Farash
    Mahmoud Ahmadian Attari
    Nonlinear Dynamics, 2014, 77 : 399 - 411