Password-based authenticated key distribution in the three-party setting with forward security

被引:0
|
作者
Wu, Shuhua [1 ]
Zhu, Yuefei [1 ]
机构
[1] Zhengzhou Informat Sci Technol Inst, Dept Networks Engn, Zhengzhou 450002, Henan, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
password authenticated; key establishment; forward-secure; three-party;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key establishment protocols are used for distributing shared keying material in a secure manner. In 1995, Bellare and Rogaway presented a three-party server-based key distribution (3PKD) protocol. But the protocol was recently found insecure and then was fixed by Choo et al. (2005b). But forward-secrecy is not considered in the revised protocol. In this paper, we demonstrate that it is not forward secure indeed. We then revise the protocol to be a password-based authenticated key distribution in the three-party setting and prove our protocol is forward secure in the random-oracle and ideal-cipher models under the password-based chosen-basis gap Diffie-Hellman assumption. Our protocol is quite simple and elegant, and rather efficient when compared to previous solutions.
引用
收藏
页码:393 / 407
页数:15
相关论文
共 50 条
  • [41] Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting
    Wu, Shuhua
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (03) : 1059 - 1072
  • [42] Efficient verifier-based password-authenticated key exchange in the three-party setting
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Sakurai, Kouichi
    Lee, Dong Hoon
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 513 - 520
  • [43] Cryptanalysis of a simple three-party password-based key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) : 532 - 542
  • [44] Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    Nam, Junghyun
    Lee, Youngsook
    Kim, Seungjoo
    Won, Dongho
    [J]. INFORMATION SCIENCES, 2007, 177 (06) : 1364 - 1375
  • [45] Password Authenticated Key Exchange Based on RSA in the Three-Party Settings
    Dongna, E.
    Cheng, Qingfeng
    Ma, Chuangui
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 168 - 182
  • [46] Enhanced password-based simple three-party key exchange protocol
    Kim, Hyun-Seok
    Choi, Jin-Young
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 107 - 114
  • [47] Cryptanalysis of an efficient three-party password-based key exchange scheme
    Simplicio, Marcos A., Jr.
    Sakuragui, Rony R. M.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (11) : 1443 - 1449
  • [48] Cryptanalysis of an efficient three-party password-based key exchange scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. 2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 3972 - 3979
  • [49] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Cheng-Chi Lee
    Chun-Ta Li
    Che-Wei Hsu
    [J]. Nonlinear Dynamics, 2013, 73 : 125 - 132
  • [50] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Lee, Cheng-Chi
    Li, Chun-Ta
    Hsu, Che-Wei
    [J]. NONLINEAR DYNAMICS, 2013, 73 (1-2) : 125 - 132