An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client–Client Networks

被引:0
|
作者
Mohammad Heydari
S. Mohammad Sajad Sadough
Mohammad Sabzinejad Farash
Shehzad Ashraf Chaudhry
Khalid Mahmood
机构
[1] Kharazmi University,Faculty of Mathematics Sciences and Computer
[2] Shahid Beheshti University,Department of Electrical Engineering
[3] International Islamic University,Department of Computer Science and Software Engineering
来源
关键词
Authenticated key exchange protocol; Dictionary attack ; Impersonation attack; Random oracle model; Provable security;
D O I
暂无
中图分类号
学科分类号
摘要
Three party password based authenticated key exchange protocol can sanction couple of clients to institute a protected session key through a server above an insecure communication link. Youn et al. (Telecommun Syst 52(2):1367–1376, 2013) proposed three-party efficient and robust authenticated key exchange scheme that incurs three rounds. They assert that their scheme is invincible against customary attacks. Moreover, they claimed the scheme is lightweight due to low communication, computation costs and incorporating authentication in three rounds. However, comprehensive analysis in this paper reveals that Youn et al.’s scheme is susceptible to impersonation attack. To overcome the security feebleness, this paper introduces a modest scheme which not only maintains round efficiency, communication and computation costs but it also offer comprehensive security to repel popular security attacks. The security of the proposed scheme is verified through random oracle model.
引用
收藏
页码:337 / 356
页数:19
相关论文
共 50 条
  • [31] Proof of forward security for password-based authenticated key exchange
    Wu, Shuhua
    Zhu, Yuefei
    [J]. International Journal of Network Security, 2008, 7 (03) : 335 - 341
  • [32] Design of a password-based authenticated key exchange protocol for SIP
    Mishra, Dheerendra
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (23) : 16017 - 16038
  • [33] Design of a password-based authenticated key exchange protocol for SIP
    Dheerendra Mishra
    [J]. Multimedia Tools and Applications, 2016, 75 : 16017 - 16038
  • [34] A New Anonymous Password-Based Authenticated Key Exchange Protocol
    Yang, Jing
    Zhang, Zhenfeng
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 200 - 212
  • [35] Improved cross-realm client-to-client password-authenticated key exchange protocol
    Cao, Tian-Jie
    Yang, Jun-Han
    [J]. Zhongguo Kuangye Daxue Xuebao/Journal of China University of Mining and Technology, 2010, 39 (03): : 443 - 448
  • [36] A New Client-to-Client Password-Authenticated Key Agreement Protocol
    Feng, Deng-Guo
    Xu, Jing
    [J]. CODING AND CRYPTOLOGY, PROCEEDINGS, 2009, 5557 : 63 - 76
  • [37] A secure and efficient three-party password-based authenticated key exchange protocol
    He, Yong-Zhong
    Cai, Ying
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 280 - +
  • [38] Efficient password-based authenticated key exchange from lattices
    Fan, Lei
    Ding, Yi
    [J]. International Journal of Advancements in Computing Technology, 2012, 4 (22) : 321 - 328
  • [39] Efficient Hybrid Password-Based Authenticated Group Key Exchange
    Wu, Shuhua
    Zhu, Yuefei
    [J]. ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2009, 5446 : 562 - 567
  • [40] Efficient and Secure Cross-Realm Client-to-Client Password-Authenticated Key Exchange
    Chuang, Po-Jen
    Liao, Yi-Ping
    [J]. 2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 701 - 708