Secure key agreement protocols for three-party against guessing attacks

被引:64
|
作者
Sun, HM
Chen, BC
Hwang, T
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
cryptography; encrypted key exchange (EKE); three-party EKE; verifier-based; guessing attacks;
D O I
10.1016/j.jss.2003.11.017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Key exchange protocol is important for sending secret messages using the session key between two parties. In order to reach the objective, the premise is to generate a session key securely. Encryption key exchange was first proposed to generate a session key with a weak authenticated password against guessing attacks. Next, another authenticated key exchange protocols for three-party, two clients who request the session key and one server who authenticates the user's identity and assist in generating a session key, were proposed. In this paper, we focus on the three-party authenticated key exchange protocol. In addition to analyzing and improving a password-based authenticated key exchange protocol, a new verified-based protocol is also proposed. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
  • [31] A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 1 - 11
  • [32] A new secure three-party authenticated key exchange protocol
    Xi'an Communications Institute, Xi'an 710106, Shannxi, China
    Int. Rev. Comput. Softw., 7 (3633-3638):
  • [33] Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
    Hong Lai
    Mehmet A. Orgun
    Jinghua Xiao
    Josef Pieprzyk
    Liyin Xue
    Yixian Yang
    Nonlinear Dynamics, 2014, 77 : 1427 - 1439
  • [34] How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols
    Wang, Weijia
    Hu, Lei
    Li, Yong
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 218 - +
  • [35] Secure authentication protocols resistant to guessing attacks
    Luo, Jia-Ning
    Shieh, Shiuhpyng
    Shen, Ji-Chiang
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (05) : 1125 - 1143
  • [36] Secure Comparison and Interval Test Protocols based on Three-party MPC
    Fujii, Wataru
    Iwamura, Keiichi
    Inamura, Masaki
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 698 - 704
  • [37] Efficient and secure password-based authentication protocols against guessing attacks
    Yonsei Univ, Seoul, Korea, Republic of
    Comput Commun, 9 (853-861):
  • [38] A novel one-round scheme against off-line password guessing attacks for three-party instance
    Bai, Yu
    Jiang, Dong Min
    Journal of Information Hiding and Multimedia Signal Processing, 2017, 8 (01): : 248 - 260
  • [39] Efficient and secure password-based authentication protocols against guessing attacks
    Kwon, T
    Song, J
    COMPUTER COMMUNICATIONS, 1998, 21 (09) : 853 - 861
  • [40] The Three-party Quantum Key Agreement Protocol with Quantum Fourier Transform
    Wei Wang
    Bao-Min Zhou
    Long Zhang
    International Journal of Theoretical Physics, 2020, 59 : 1944 - 1955