Provably secure three-party password-based authenticated key exchange protocol

被引:32
|
作者
Zhao, Jianjie [1 ]
Gu, Dawu [2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Authenticated key agreement; Trapdoor test; CDH assumption; AGREEMENT PROTOCOL; EFFICIENT;
D O I
10.1016/j.ins.2011.07.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A three-party password-based authenticated key exchange (3PAKE) protocol is a useful mechanism to establish a secure session key in a network. However, most current 3PAKE protocols only achieve "heuristic" security; the underlying hardness assumptions of these protocols are not perfect. We propose a 3PAKE protocol which is provably secure if the Diffie-Hellman problem is computationally infeasible (the CDH assumption), even in the 3eCK model where the adversary is allowed to make more queries and have more freedom than previous models. In our formal proof, we use the trapdoor test technique introduced by Cash, Kiltz and Shoup to construct an efficient decision oracle. As far as we know, our protocol is the first provably secure 3PAKE protocol based on the CDH assumption and the first 3PAKE protocol using the trapdoor test technique for the security proof. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:310 / 323
页数:14
相关论文
共 50 条
  • [41] Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Kim, Moonseong
    Paik, Juryon
    Won, Dongho
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3244 - 3260
  • [42] A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks
    Farash, Mohammad Sabzinejad
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17): : 4897 - 4913
  • [43] Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification
    Xie, Qi
    Dong, Na
    Tan, Xiao
    Wong, Duncan S.
    Wang, Guilin
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (03): : 231 - 237
  • [44] Efficient and secure password-based authenticated key exchange protocol
    Wu, Shuhua
    Zhu, Yuefei
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1269 - 1272
  • [45] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Cheng-Chi Lee
    Chun-Ta Li
    Che-Wei Hsu
    Nonlinear Dynamics, 2013, 73 : 125 - 132
  • [46] Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol
    Tu, Hang
    Shen, Han
    He, Debiao
    Chen, Jianhua
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (01): : 57 - 63
  • [47] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Lee, Cheng-Chi
    Li, Chun-Ta
    Hsu, Che-Wei
    NONLINEAR DYNAMICS, 2013, 73 (1-2) : 125 - 132
  • [49] Secure verifier-based three-party password-authenticated key exchange
    Qiong Pu
    Jian Wang
    Shuhua Wu
    Ji Fu
    Peer-to-Peer Networking and Applications, 2013, 6 : 15 - 25
  • [50] Secure verifier-based three-party password-authenticated key exchange
    Pu, Qiong
    Wang, Jian
    Wu, Shuhua
    Fu, Ji
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (01) : 15 - 25