Secure verifier-based three-party password-authenticated key exchange

被引:0
|
作者
Qiong Pu
Jian Wang
Shuhua Wu
Ji Fu
机构
[1] Tongji Univerity,CIMS Research Center
[2] Graduate University of Chinese Academy of Sciences,State Key Laboratory of Information Security
[3] Information Engineering University,Department of Network Engineering
关键词
Password-based; Authenticated key exchange; Three-party; Dictionary attack; Verifier-based;
D O I
暂无
中图分类号
学科分类号
摘要
In order to secure large-scale peer-to-peer communication system, Chien recently presented a three-party password authenticated key exchange protocol using verifiers to reduce the damages of server corruption. In this paper, we first show his protocol is still vulnerable to a partition attack (offline dictionary attack). Thereafter we propose an enhanced verifier-based protocol that can defeat the attacks described and yet is reasonably efficient. Furthermore, we can provide the rigorous proof of the security for it.
引用
收藏
页码:15 / 25
页数:10
相关论文
共 50 条
  • [1] Secure verifier-based three-party password-authenticated key exchange
    Pu, Qiong
    Wang, Jian
    Wu, Shuhua
    Fu, Ji
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (01) : 15 - 25
  • [2] Efficient verifier-based password-authenticated key exchange in the three-party setting
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Sakurai, Kouichi
    Lee, Dong Hoon
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 513 - 520
  • [3] Verifier-Based Three-Party Password-Authenticated Key Exchange with Forward Security
    Tian Bin
    Chen Mengdong
    Liu Lianzhong
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 56 - 61
  • [4] Improved Verifier-based Three-party Password-authenticated Key Exchange Protocol
    Zhang, Qi-Hui
    Hu, Xue-Xian
    Liu, Wen-Fen
    Wei, Jiang-Hong
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (10): : 3238 - 3250
  • [5] Weaknesses of a Verifier-based Password-authenticated Key Exchange Protocol in the Three-party Setting
    Pu, Qiong
    Liu, Wei
    2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 3 - 6
  • [6] Improved Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices
    Tang, Yongli
    Li, Ying
    Zhao, Zongqu
    Zhang, Jing
    Ren, Lina
    Li, Yuanhong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting
    Wu, Shuhua
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (03) : 1059 - 1072
  • [8] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [9] Post-quantum verifier-based three-party password authenticated key exchange protocol
    Lian H.
    Hou H.
    Zhao Y.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (04): : 95 - 106
  • [10] Practical Password-Authenticated Three-Party Key Exchange
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Lee, Dong Hoon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (06): : 312 - 332