Weaknesses of a Verifier-based Password-authenticated Key Exchange Protocol in the Three-party Setting

被引:0
|
作者
Pu, Qiong [1 ]
Liu, Wei [1 ]
机构
[1] Informat Engn Univ, Inst Sci, Dept Elect, Zhengzhou, Henan, Peoples R China
关键词
cryptanalysis; three-party; verifier-based; password authenticated key exchange; elliptic curve; SECURE;
D O I
10.1109/ICRCCS.2009.10
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Quite recently, Li et al's suggested an efficient verifier-based password-authentication key exchange protocol via elliptic curves. In this paper, we shows that their protocol is still vulnerable to off-line dictionary attack and unknown key-share attack. Through our work, we hope the similar mistakes can be avoided in future designs.
引用
收藏
页码:3 / 6
页数:4
相关论文
共 50 条
  • [1] Efficient verifier-based password-authenticated key exchange in the three-party setting
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Sakurai, Kouichi
    Lee, Dong Hoon
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 513 - 520
  • [2] Improved Verifier-based Three-party Password-authenticated Key Exchange Protocol
    Zhang, Qi-Hui
    Hu, Xue-Xian
    Liu, Wen-Fen
    Wei, Jiang-Hong
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (10): : 3238 - 3250
  • [3] Secure verifier-based three-party password-authenticated key exchange
    Pu, Qiong
    Wang, Jian
    Wu, Shuhua
    Fu, Ji
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (01) : 15 - 25
  • [4] Secure verifier-based three-party password-authenticated key exchange
    Qiong Pu
    Jian Wang
    Shuhua Wu
    Ji Fu
    [J]. Peer-to-Peer Networking and Applications, 2013, 6 : 15 - 25
  • [5] Verifier-Based Three-Party Password-Authenticated Key Exchange with Forward Security
    Tian Bin
    Chen Mengdong
    Liu Lianzhong
    [J]. ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 56 - 61
  • [6] Improved Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices
    Tang, Yongli
    Li, Ying
    Zhao, Zongqu
    Zhang, Jing
    Ren, Lina
    Li, Yuanhong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting
    Wu, Shuhua
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (03) : 1059 - 1072
  • [8] Post-quantum verifier-based three-party password authenticated key exchange protocol
    Lian H.
    Hou H.
    Zhao Y.
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (04): : 95 - 106
  • [9] A new verifier-based anonymous password-authenticated key exchange protocol
    [J]. Wu, Tsu-Yang (wutsuyang@gmail.com), 2018, Ubiquitous International (09):
  • [10] Verifier-based Password-Authenticated Key Exchange Protocol in Cross-Realm Setting
    Liu, Xiumei
    Zhou, Fucai
    Chang, Guiran
    [J]. CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 5560 - 5563