Three-party password authenticated key agreement resistant to server compromise

被引:0
|
作者
Kwon, Taekyoung [1 ]
Lee, Dong Hoon [2 ]
机构
[1] Sejong Univ, Sch Comp Engn, Seoul 143747, South Korea
[2] Natl Secur Res Inst, Taejeon, South Korea
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of password authenticated key agreement protocols have focused on the two-party setting where two communicating parties share a human-memorable password. In this paper, we study password authenticated key agreement in the three-party setting where both communicating parties share respective passwords with a trusted third party rather than themselves. Previous results in this area have lack of security concerns and are never considered in the augmented model which was contrived to resist server compromise. Our contribution is, from the practical perspective, a new three-party password authenticated key agreement protocol that is first designed in the augmented model and very flexible in its message flows.
引用
收藏
页码:312 / +
页数:3
相关论文
共 50 条
  • [1] Improvement on the password authenticated three-party key agreement protocol
    Department of Security Technology and Management, Wufeng University, Chiayi 62153, Taiwan
    不详
    不详
    J. Comput. Inf. Syst., 1 (42-48): : 42 - 48
  • [2] Elliptic curve isogenies–based three-party password authenticated key agreement scheme towards quantum–resistant
    Zhu, Hongfeng (zhuhongfeng1978@163.com), 1600, Ubiquitous International (05):
  • [3] Three-party password authenticated key agreement protocol with user anonymity based on lattice
    Wang C.
    Chen L.
    2018, Editorial Board of Journal on Communications (39): : 17 - 26
  • [4] Simple three-party password authenticated key exchange protocol
    Lo N.-W.
    Yeh K.-H.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 600 - 603
  • [5] Practical Password-Authenticated Three-Party Key Exchange
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Lee, Dong Hoon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (06): : 312 - 332
  • [6] Simple Three-Party Password Authenticated Key Exchange Protocol
    罗乃维
    叶国晖
    JournalofShanghaiJiaotongUniversity(Science), 2011, 16 (05) : 600 - 603
  • [7] Chaotic maps-based three-party password-authenticated key agreement scheme
    Xie, Qi
    Zhao, Jianmin
    Yu, Xiuyuan
    NONLINEAR DYNAMICS, 2013, 74 (04) : 1021 - 1027
  • [8] Universally Composable Three-Party Password Authenticated Key Exchange
    Zhang, Qihui
    Hu, Xuexian
    Wei, Jianghong
    Liu, Wenfen
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 123 - 137
  • [9] Chaotic maps-based three-party password-authenticated key agreement scheme
    Qi Xie
    Jianmin Zhao
    Xiuyuan Yu
    Nonlinear Dynamics, 2013, 74 : 1021 - 1027
  • [10] A method for making three-party password-based key exchange resilient to server compromise
    Zhu Hongfeng
    Liu Tianhua
    Re, Liu
    Chang Guiran
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 546 - +