Password Authenticated Key Exchange Based on RSA in the Three-Party Settings

被引:0
|
作者
Dongna, E. [1 ]
Cheng, Qingfeng [1 ]
Ma, Chuangui [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450002, Henan Province, Peoples R China
来源
关键词
Password Authenticated Key Exchange; RSA; e-Residue Attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A great deal of password authenticated key exchange (FAKE) protocols have been proposed in recent years. Most of them were based on Diffie-Hellman key exchange. While the approach of designing FAKE protocols with RSA is far from maturity and perfection. In fact, the existing PAKE protocols using RSA or other public-key cryptographic techniques provide an authenticated key exchange only between a client and a server. This paper presents a new efficient FAKE protocol using RSA in the three-party settings (3PAKE-RSA). The novel protocol can be resistant to e-residue attack and provably secure under the RSA assumption in the random oracle model.
引用
收藏
页码:168 / 182
页数:15
相关论文
共 50 条
  • [21] A communication-efficient three-party password authenticated key exchange protocol
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Wei-Pang
    [J]. INFORMATION SCIENCES, 2011, 181 (01) : 217 - 226
  • [22] Universally composable three-party password-authenticated key exchange with contributiveness
    Hu, Xuexian
    Zhang, Zhenfeng
    Zhang, Qihui
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (06) : 1100 - 1111
  • [23] THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES
    Yi, Xun
    Tso, Raylin
    Okamoto, Eiji
    [J]. SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 15 - 24
  • [24] Re-attack on a three-party password-based authenticated key exchange protocol
    Liang, Haiquan
    Hu, Jingtai
    Wu, Shuhua
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (5-6) : 1175 - 1183
  • [25] Provably leakage-resilient three-party password-based authenticated key exchange
    Ruan, Ou
    Wang, Qingping
    Wang, Zihao
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (01) : 163 - 173
  • [26] Analysis of Two Pairing-based Three-party Password Authenticated Key Exchange Protocols
    Phan, Raphael C. -W.
    Yau, Wei-Chuen
    Goi, Bok-Min
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 102 - +
  • [27] Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE
    Liu, Chao
    Zheng, Zhongxiang
    Jia, Keting
    You, Qidi
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 56 - 72
  • [28] Provably leakage-resilient three-party password-based authenticated key exchange
    Ou Ruan
    Qingping Wang
    Zihao Wang
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 163 - 173
  • [29] Security analysis and enhancement for three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    Zhang, Lei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 273 - 278
  • [30] Efficient verifier-based password-authenticated key exchange in the three-party setting
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Sakurai, Kouichi
    Lee, Dong Hoon
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 513 - 520