An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks

被引:18
|
作者
Heydari, Mohammad [2 ]
Sadough, S. Mohammad Sajad [2 ]
Farash, Mohammad Sabzinejad [1 ]
Chaudhry, Shehzad Ashraf [3 ]
Mahmood, Khalid [3 ]
机构
[1] Kharazmi Univ, Fac Math Sci & Comp, Tehran, Iran
[2] Shahid Beheshti Univ, Dept Elect Engn, Tehran, Iran
[3] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
关键词
Authenticated key exchange protocol; Dictionary attack; Impersonation attack; Random oracle model; Provable security; CRYPTANALYSIS; AGREEMENT; MODEL;
D O I
10.1007/s11277-015-3123-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Three party password based authenticated key exchange protocol can sanction couple of clients to institute a protected session key through a server above an insecure communication link. Youn et al. (Telecommun Syst 52(2):1367-1376, 2013) proposed three-party efficient and robust authenticated key exchange scheme that incurs three rounds. They assert that their scheme is invincible against customary attacks. Moreover, they claimed the scheme is lightweight due to low communication, computation costs and incorporating authentication in three rounds. However, comprehensive analysis in this paper reveals that Youn et al.'s scheme is susceptible to impersonation attack. To overcome the security feebleness, this paper introduces a modest scheme which not only maintains round efficiency, communication and computation costs but it also offer comprehensive security to repel popular security attacks. The security of the proposed scheme is verified through random oracle model.
引用
收藏
页码:337 / 356
页数:20
相关论文
共 50 条
  • [21] A password-based authenticated key exchange protocol for mobile-commerce environments
    Fan, Ya-Jun
    Wen, Qiao-Yan
    Jin, Zheng-Ping
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2010, 33 (06): : 64 - 67
  • [22] Efficient password-based authenticated key agreement protocol
    Lee, SW
    Kim, WH
    Kim, HS
    Yoo, KY
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 617 - 626
  • [23] Efficient three-party password-based authenticated key exchange protocol
    [J]. Xu, C.-X., 1600, Univ. of Electronic Science and Technology of China (41):
  • [24] The efficient 3-pass password-based key exchange protocol with low computational cost for client
    Lee, H
    Sohn, K
    Yang, H
    Won, D
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 147 - 155
  • [25] Efficient password-based authenticated key exchange protocol under standard model
    Shu, Jian
    Xu, Chun-Xiang
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (11): : 2716 - 2719
  • [26] An efficient client-to-client password-authenticated key exchange resilient to server compromise
    Hongfeng, Zhu
    Tianhua, Liu
    Je, Liu
    Guiran, Chang
    [J]. 13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 405 - 408
  • [27] Password-Based Authenticated Key Exchange
    Pointcheval, David
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 390 - 397
  • [28] A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 69 (01): : 395 - 411
  • [29] Analysis and improvement of a password-based authenticated key exchange protocol
    Shu, Jian
    Xu, Chun-Xiang
    [J]. Tongxin Xuebao/Journal on Communications, 2010, 31 (03): : 51 - 56