Secure key agreement protocols for three-party against guessing attacks

被引:64
|
作者
Sun, HM
Chen, BC
Hwang, T
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
cryptography; encrypted key exchange (EKE); three-party EKE; verifier-based; guessing attacks;
D O I
10.1016/j.jss.2003.11.017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Key exchange protocol is important for sending secret messages using the session key between two parties. In order to reach the objective, the premise is to generate a session key securely. Encryption key exchange was first proposed to generate a session key with a weak authenticated password against guessing attacks. Next, another authenticated key exchange protocols for three-party, two clients who request the session key and one server who authenticates the user's identity and assist in generating a session key, were proposed. In this paper, we focus on the three-party authenticated key exchange protocol. In addition to analyzing and improving a password-based authenticated key exchange protocol, a new verified-based protocol is also proposed. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
  • [41] Novel Attacks and Novel Efficient Three-Party Authenticated Key Agreement Schemes for Resource-limited Devices
    Chien, Hung-Yu
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (07): : 2177 - 2188
  • [42] Efficient three-party authenticated key agreement protocol in certificateless cryptography
    Xiong, Hu
    Chen, Zhong
    Qin, Zhiguang
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (13) : 2707 - 2716
  • [43] The Three-party Quantum Key Agreement Protocol with Quantum Fourier Transform
    Wang, Wei
    Zhou, Bao-Min
    Zhang, Long
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (06) : 1944 - 1955
  • [44] Three-Party Quantum Key Agreement with Two-Photon Entanglement
    Xun-Ru Yin
    Wen-Ping Ma
    Wei-Yan Liu
    International Journal of Theoretical Physics, 2013, 52 : 3915 - 3921
  • [45] Three-party password authenticated key agreement resistant to server compromise
    Kwon, Taekyoung
    Lee, Dong Hoon
    INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 312 - +
  • [46] Yet Another Certificateless three-party authenticated key agreement protocol
    Hu, Jianbin
    Xiong, Hu
    Guan, Zhi
    Tang, Cong
    Wang, Yonggang
    Xin, Wei
    Chen, Zhong
    2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 222 - 226
  • [47] Chaotic map-based three-party authenticated key agreement
    Lin, Han-Yu
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2469 - 2474
  • [48] On session identifiers in provably secure protocols - The Bellare-Rogaway three-party key distribution protocol revisited
    Choo, KKR
    Boyd, C
    Hitchcock, Y
    Maitland, G
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 351 - 366
  • [49] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [50] Security analysis and enhancements of a three-party authenticated key agreement protocol
    Wang, Zhiheng
    Huo, Zhanqiang
    Shi, Wenbo
    ACTA SCIENTIARUM-TECHNOLOGY, 2015, 37 (03) : 329 - 336