Efficient verifier-based password-authenticated key exchange in the three-party setting

被引:24
|
作者
Kwon, Jeong Ok
Jeong, Ik Rae
Sakurai, Kouichi
Lee, Dong Hoon
机构
[1] Korea Univ, Grad Sch Informat Secur CIST, Seoul 136701, South Korea
[2] ETRI, Taejon 305700, South Korea
[3] Kyushu Univ, Dept Comp Sci & Commun Engn, Higashi Ku, Fukuoka 8120053, Japan
关键词
cryptology; password-authenticated key exchange; verifier-based; dictionary attack;
D O I
10.1016/j.csi.2006.12.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the last few years, researchers have extensively studied the password-authenticated key exchange (PAKE) in the three-party setting. The fundamental security goal of PAKE is security against dictionary attacks. The protocols for verifier-based PAKE are additionally required to be secure against server compromise. Some verifier-based PAKE schemes in the three-party setting have been suggested to solve the server compromise problem. Unfortunately, the protocols are vulnerable to an off-line dictionary attack. In this paper, we present an efficient verifier-based PAKE protocol for three-parties that is secure against known-key attacks and provides forward secrecy. To the best of our knowledge, the proposed protocol is the first secure three-party verifier-based PAKE protocol in the literature. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:513 / 520
页数:8
相关论文
共 50 条
  • [1] Secure verifier-based three-party password-authenticated key exchange
    Pu, Qiong
    Wang, Jian
    Wu, Shuhua
    Fu, Ji
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (01) : 15 - 25
  • [2] Secure verifier-based three-party password-authenticated key exchange
    Qiong Pu
    Jian Wang
    Shuhua Wu
    Ji Fu
    [J]. Peer-to-Peer Networking and Applications, 2013, 6 : 15 - 25
  • [3] Weaknesses of a Verifier-based Password-authenticated Key Exchange Protocol in the Three-party Setting
    Pu, Qiong
    Liu, Wei
    [J]. 2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 3 - 6
  • [4] Verifier-Based Three-Party Password-Authenticated Key Exchange with Forward Security
    Tian Bin
    Chen Mengdong
    Liu Lianzhong
    [J]. ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 56 - 61
  • [5] Improved Verifier-based Three-party Password-authenticated Key Exchange Protocol
    Zhang, Qi-Hui
    Hu, Xue-Xian
    Liu, Wen-Fen
    Wei, Jiang-Hong
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (10): : 3238 - 3250
  • [6] Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting
    Wu, Shuhua
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (03) : 1059 - 1072
  • [7] Improved Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices
    Tang, Yongli
    Li, Ying
    Zhao, Zongqu
    Zhang, Jing
    Ren, Lina
    Li, Yuanhong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] ECC-Based Password-Authenticated Key Exchange in the Three-Party Setting
    Liu, Tingting
    Pu, Qiong
    Zhao, Yong
    Wu, Shuhua
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08): : 2069 - 2077
  • [9] Post-quantum verifier-based three-party password authenticated key exchange protocol
    Lian H.
    Hou H.
    Zhao Y.
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (04): : 95 - 106
  • [10] ECC-Based Password-Authenticated Key Exchange in the Three-Party Setting
    Tingting Liu
    Qiong Pu
    Yong Zhao
    Shuhua Wu
    [J]. Arabian Journal for Science and Engineering, 2013, 38 : 2069 - 2077