Password-authenticated key exchange between clients with different passwords

被引:0
|
作者
Byun, JW [1 ]
Jeong, IR
Lee, DH
Park, CS
机构
[1] Korea Univ, CIST, Sungbuk Gu, Seoul 136701, South Korea
[2] Dankook Univ, Div Comp Sci & Elect, Cheonan, South Korea
关键词
password authentication; key exchange; cross-realm; Kerberos; dictionary attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most password-authenticated key exchange schemes in the literature provide an authenticated key exchange between a client and a server based on a pre-shared password. With a rapid change in modern communication environments, it is necessary to construct a secure end-to-end channel between clients, which is a quite different paradigm from the existing ones. In this paper we propose a new framework which provides a password-authenticated key exchange between clients based only on their two different passwords without any pre-shared secret, so called Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE). Security notions and types of possible attacks are newly defined according to the new framework. We prove our scheme is secure against all types of attacks considered in the paper. Two secure C2C-PAKE schemes are suggested, one in a cross-realm setting and the other in a single-server setting.
引用
收藏
页码:134 / 146
页数:13
相关论文
共 50 条
  • [1] A secure password-authenticated key exchange between clients with different passwords
    Yoon, EJ
    Yoo, KY
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 659 - 663
  • [2] Weaknesses of a password-authenticated key exchange protocol between clients with different passwords
    Wang, SH
    Wang, J
    Xu, MZ
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 414 - 425
  • [3] Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords
    Kim, J
    Kim, S
    Kwak, J
    Won, DH
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 895 - 902
  • [4] Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting
    Wu, Shuhua
    Zhu, Yuefei
    NETWORK AND PARALLEL COMPUTING, 2008, 5245 : 94 - 104
  • [5] nPAKE+:: A hierarchical group password-authenticated key exchange protocol using different passwords
    Wan, Zhiguo
    Deng, Robert H.
    Bao, Feng
    Preneel, Bart
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 31 - +
  • [6] Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption
    Wang, Fengjiao
    Zhang, Yuqing
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 124 - 133
  • [7] Efficient password-authenticated key exchange using human-memorable passwords
    Katz, J
    Ostrovsky, R
    Yung, M
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 475 - 494
  • [8] Threshold password-authenticated key exchange
    MacKenzie, P
    Shrimpton, T
    Jakobsson, M
    JOURNAL OF CRYPTOLOGY, 2006, 19 (01) : 27 - 66
  • [9] Threshold Password-Authenticated Key Exchange
    Philip MacKenzie
    Thomas Shrimpton
    Markus Jakobsson
    Journal of Cryptology, 2006, 19 : 27 - 66
  • [10] Fuzzy Password-Authenticated Key Exchange
    Dupont, Pierre-Alain
    Hesse, Julia
    Pointcheval, David
    Reyzin, Leonid
    Yakoubov, Sophia
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 393 - 424