Secure key agreement protocols for three-party against guessing attacks

被引:64
|
作者
Sun, HM
Chen, BC
Hwang, T
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
cryptography; encrypted key exchange (EKE); three-party EKE; verifier-based; guessing attacks;
D O I
10.1016/j.jss.2003.11.017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Key exchange protocol is important for sending secret messages using the session key between two parties. In order to reach the objective, the premise is to generate a session key securely. Encryption key exchange was first proposed to generate a session key with a weak authenticated password against guessing attacks. Next, another authenticated key exchange protocols for three-party, two clients who request the session key and one server who authenticates the user's identity and assist in generating a session key, were proposed. In this paper, we focus on the three-party authenticated key exchange protocol. In addition to analyzing and improving a password-based authenticated key exchange protocol, a new verified-based protocol is also proposed. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
  • [11] Provably secure three-party authenticated key agreement protocol using smart cards
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    Fu, Xiaoming
    Liu, Hao
    Vasilakos, Athanasios V.
    COMPUTER NETWORKS, 2014, 58 : 29 - 38
  • [12] Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks
    Kwon, Jeong Ok
    Sakurai, Kouichi
    Lee, Dong Hoon
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 1, PROCEEDINGS, 2006, 3991 : 977 - 980
  • [13] Three-party quantum key agreement with Bell states
    Yin Xun-Ru
    Ma Wen-Ping
    Shen Dong-Su
    Wang Li-Li
    ACTA PHYSICA SINICA, 2013, 62 (17)
  • [14] Three-party Encrypted Key Exchange: Attacks and a Solution
    Lin, Chun-Li
    Sun, Hung-Min
    Hwang, Tzonelih
    Operating Systems Review (ACM), 2000, 34 (04): : 12 - 20
  • [15] Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
    Chen, Chi-Tung
    Lee, Cheng-Chi
    Lin, Iuon-Chang
    PLOS ONE, 2020, 15 (04):
  • [16] Lower Bounds and Optimal Protocols for Three-Party Secure Computation
    Rajan, Sundara S.
    Rajakrishnan, Shijin
    Thangaraj, Andrew
    Prabhakaran, Vinod
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 1361 - 1365
  • [17] Multi-party quantum key agreement protocol secure against collusion attacks
    Wang, Ping
    Sun, Zhiwei
    Sun, Xiaoqiang
    QUANTUM INFORMATION PROCESSING, 2017, 16 (07)
  • [18] Multi-party quantum key agreement protocol secure against collusion attacks
    Ping Wang
    Zhiwei Sun
    Xiaoqiang Sun
    Quantum Information Processing, 2017, 16
  • [19] Three-Party Semi-Quantum Key Agreement Protocol
    Zhou, Nan-Run
    Zhu, Kong-Ni
    Wang, Yun-Qian
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (03) : 663 - 676
  • [20] Cryptanalysis of two three-party encrypted key exchange protocols
    Lo, N. W.
    Yeh, Kuo-Hui
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1167 - 1174