Secure key agreement protocols for three-party against guessing attacks

被引:64
|
作者
Sun, HM
Chen, BC
Hwang, T
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
cryptography; encrypted key exchange (EKE); three-party EKE; verifier-based; guessing attacks;
D O I
10.1016/j.jss.2003.11.017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Key exchange protocol is important for sending secret messages using the session key between two parties. In order to reach the objective, the premise is to generate a session key securely. Encryption key exchange was first proposed to generate a session key with a weak authenticated password against guessing attacks. Next, another authenticated key exchange protocols for three-party, two clients who request the session key and one server who authenticates the user's identity and assist in generating a session key, were proposed. In this paper, we focus on the three-party authenticated key exchange protocol. In addition to analyzing and improving a password-based authenticated key exchange protocol, a new verified-based protocol is also proposed. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
  • [21] Three-Party Semi-Quantum Key Agreement Protocol
    Nan-Run Zhou
    Kong-Ni Zhu
    Yun-Qian Wang
    International Journal of Theoretical Physics, 2020, 59 : 663 - 676
  • [22] Improvement on the password authenticated three-party key agreement protocol
    Department of Security Technology and Management, Wufeng University, Chiayi 62153, Taiwan
    不详
    不详
    J. Comput. Inf. Syst., 1 (42-48): : 42 - 48
  • [23] Efficient three-party key exchange protocols with round efficiency
    Taek-Young Youn
    Eun Sook Kang
    Changhoon Lee
    Telecommunication Systems, 2013, 52 : 1367 - 1376
  • [24] Two proposed identity-based three-party authenticated key agreement protocols from pairings
    Holbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    COMPUTERS & SECURITY, 2010, 29 (02) : 244 - 252
  • [25] Efficient three-party key exchange protocols with round efficiency
    Youn, Taek-Young
    Kang, Eun Sook
    Lee, Changhoon
    TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 1367 - 1376
  • [26] Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
    Lai, Hong
    Orgun, Mehmet A.
    Xiao, Jinghua
    Pieprzyk, Josef
    Xue, Liyin
    Yang, Yixian
    NONLINEAR DYNAMICS, 2014, 77 (04) : 1427 - 1439
  • [27] New Efficient Three-Party Quantum Key Distribution Protocols
    Shih, Han-Cheng
    Lee, Kuo-Chang
    Hwang, Tzonelih
    IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2009, 15 (06) : 1602 - 1606
  • [28] Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords
    Nam, J
    Kim, S
    Won, D
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) : 209 - 212
  • [29] Looking for diamonds in the desert - Extending automatic protocol generation to three-party authentication and key agreement protocols
    Perrig, A
    Song, D
    13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 64 - 76
  • [30] Analysis of Two Secure Three-Party Computation Protocols for Triangle Area
    Liu, Lihua
    Cao, Jie
    International Journal of Network Security, 2021, 23 (04) : 734 - 737