Three-party password authenticated key agreement resistant to server compromise

被引:0
|
作者
Kwon, Taekyoung [1 ]
Lee, Dong Hoon [2 ]
机构
[1] Sejong Univ, Sch Comp Engn, Seoul 143747, South Korea
[2] Natl Secur Res Inst, Taejeon, South Korea
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of password authenticated key agreement protocols have focused on the two-party setting where two communicating parties share a human-memorable password. In this paper, we study password authenticated key agreement in the three-party setting where both communicating parties share respective passwords with a trusted third party rather than themselves. Previous results in this area have lack of security concerns and are never considered in the augmented model which was contrived to resist server compromise. Our contribution is, from the practical perspective, a new three-party password authenticated key agreement protocol that is first designed in the augmented model and very flexible in its message flows.
引用
收藏
页码:312 / +
页数:3
相关论文
共 50 条
  • [21] A communication-efficient three-party password authenticated key exchange protocol
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Wei-Pang
    INFORMATION SCIENCES, 2011, 181 (01) : 217 - 226
  • [22] Efficient three-party password-based authenticated key exchange protocol
    Xu, C.-X., 1600, Univ. of Electronic Science and Technology of China (41):
  • [23] Strongly password-based three-party authenticated key exchange protocol
    Lin, Yuanhui
    Hou, Mengbo
    Xu, Qiuliang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 555 - 558
  • [24] Efficient three-party authenticated key agreement protocol in certificateless cryptography
    Xiong, Hu
    Chen, Zhong
    Qin, Zhiguang
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (13) : 2707 - 2716
  • [25] Yet Another Certificateless three-party authenticated key agreement protocol
    Hu, Jianbin
    Xiong, Hu
    Guan, Zhi
    Tang, Cong
    Wang, Yonggang
    Xin, Wei
    Chen, Zhong
    2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 222 - 226
  • [26] Chaotic map-based three-party authenticated key agreement
    Lin, Han-Yu
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2469 - 2474
  • [27] Cryptanalysis of a three-party password-based authenticated key exchange protocol
    He, D. (hedebiao@163.com), 1600, Femto Technique Co., Ltd. (16):
  • [28] THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES
    Yi, Xun
    Tso, Raylin
    Okamoto, Eiji
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 15 - 24
  • [29] Security analysis and enhancements of a three-party authenticated key agreement protocol
    Wang, Zhiheng
    Huo, Zhanqiang
    Shi, Wenbo
    ACTA SCIENTIARUM-TECHNOLOGY, 2015, 37 (03) : 329 - 336
  • [30] Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
    Xiong, Hu
    Chen, Yanan
    Guan, Zhi
    Chen, Zhong
    INFORMATION SCIENCES, 2013, 235 : 329 - 340