Password-based authenticated key distribution in the three-party setting with forward security

被引:0
|
作者
Wu, Shuhua [1 ]
Zhu, Yuefei [1 ]
机构
[1] Zhengzhou Informat Sci Technol Inst, Dept Networks Engn, Zhengzhou 450002, Henan, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
password authenticated; key establishment; forward-secure; three-party;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key establishment protocols are used for distributing shared keying material in a secure manner. In 1995, Bellare and Rogaway presented a three-party server-based key distribution (3PKD) protocol. But the protocol was recently found insecure and then was fixed by Choo et al. (2005b). But forward-secrecy is not considered in the revised protocol. In this paper, we demonstrate that it is not forward secure indeed. We then revise the protocol to be a password-based authenticated key distribution in the three-party setting and prove our protocol is forward secure in the random-oracle and ideal-cipher models under the password-based chosen-basis gap Diffie-Hellman assumption. Our protocol is quite simple and elegant, and rather efficient when compared to previous solutions.
引用
收藏
页码:393 / 407
页数:15
相关论文
共 50 条
  • [1] Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting
    Wu, Shuhua
    Zhu, Yuefei
    [J]. Network and Parallel Computing, 2008, 5245 : 105 - 115
  • [2] Password-based authenticated key exchange in the three-party setting
    Abdalla, M.
    Fouque, P.-A.
    Pointcheval, D.
    [J]. IEE Proceedings: Information Security, 2006, 153 (01): : 27 - 39
  • [3] Password-based authenticated key exchange in the three-party setting
    Abdalla, M
    Fouque, PA
    Pointcheval, D
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 65 - 84
  • [4] Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol
    Wang, Qingping
    Ruan, Ou
    Wang, Zihao
    [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 497 - 508
  • [5] Security analysis and enhancement for three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    Zhang, Lei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 273 - 278
  • [6] Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol
    Wu, Shuhua
    Chen, Kefei
    Zhu, Yuefei
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (03) : 215 - 221
  • [7] Efficient three-party password-based authenticated key exchange protocol
    [J]. Xu, C.-X., 1600, Univ. of Electronic Science and Technology of China (41):
  • [8] Strongly password-based three-party authenticated key exchange protocol
    Lin, Yuanhui
    Hou, Mengbo
    Xu, Qiuliang
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 555 - 558
  • [9] Cryptanalysis of a three-party password-based authenticated key exchange protocol
    [J]. He, D. (hedebiao@163.com), 1600, Femto Technique Co., Ltd. (16):
  • [10] A secure and efficient three-party password-based authenticated key exchange protocol
    He, Yong-Zhong
    Cai, Ying
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 280 - +