Secure key agreement protocols for three-party against guessing attacks

被引:64
|
作者
Sun, HM
Chen, BC
Hwang, T
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
cryptography; encrypted key exchange (EKE); three-party EKE; verifier-based; guessing attacks;
D O I
10.1016/j.jss.2003.11.017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Key exchange protocol is important for sending secret messages using the session key between two parties. In order to reach the objective, the premise is to generate a session key securely. Encryption key exchange was first proposed to generate a session key with a weak authenticated password against guessing attacks. Next, another authenticated key exchange protocols for three-party, two clients who request the session key and one server who authenticates the user's identity and assist in generating a session key, were proposed. In this paper, we focus on the three-party authenticated key exchange protocol. In addition to analyzing and improving a password-based authenticated key exchange protocol, a new verified-based protocol is also proposed. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
  • [1] Efficient three-party authentication and key agreement protocols resistant to password guessing attacks
    Yeh, HT
    Sun, HM
    Hwang, T
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2003, 19 (06) : 1059 - 1070
  • [2] Communication-efficient three-party protocols for authentication and key agreement
    Lee, Tian-Fu
    Liu, Jenn-Long
    Sung, Mei-Jiun
    Yang, Shiueng-Bien
    Chen, Chia-Mei
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2009, 58 (04) : 641 - 648
  • [3] Provably secure three-party authenticated quantum key distribution protocols
    Hwang, Tzonelih
    Lee, Kuo-Chang
    Li, Chuan-Ming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (01) : 71 - 80
  • [4] Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Kim, Moonseong
    Paik, Juryon
    Won, Dongho
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3244 - 3260
  • [5] Three-party secure authenticated key agreement protocol based on identity sign
    Li, Ning
    Yeap, Tet
    Yu, Chong xiu
    IC-BNMT 2007: PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2007, : 103 - 105
  • [6] Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
    Chen, Hsing-Bai
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chang, Chin-Chen
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (1-2) : 95 - 99
  • [7] Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
    Tian-Fu Lee
    Ching-Ying Lin
    Chun-Li Lin
    Tzonelih Hwang
    Nonlinear Dynamics, 2015, 82 : 29 - 38
  • [8] Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
    Lee, Tian-Fu
    Lin, Ching-Ying
    Lin, Chun-Li
    Hwang, Tzonelih
    NONLINEAR DYNAMICS, 2015, 82 (1-2) : 29 - 38
  • [9] Secure three-party computational protocols for triangle area
    Liang Liu
    Xiaofeng Chen
    Wenjing Lou
    International Journal of Information Security, 2016, 15 : 1 - 13
  • [10] Secure three-party computational protocols for triangle area
    Liu, Liang
    Chen, Xiaofeng
    Lou, Wenjing
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 1 - 13