Security analysis and improvements of a universal construction for a round-optimal password authenticated key exchange protocol

被引:0
作者
Zhu, Hongfeng [1 ]
Wang, Xintong [1 ]
Chen, Yeh-Cheng [2 ]
Wang, Xueying [1 ]
机构
[1] Shenyang Normal Univ, Software Coll, 253 Huanghe Bei St, Shenyang 110034, Peoples R China
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA USA
关键词
authentication; key exchange; chaotic maps; one-round communication; key compromise impersonation; KCI;
D O I
10.1504/IJICS.2022.121293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key exchange (AKE) protocols enable two parties to generate a shared, cryptographically strong key while communicating over an insecure network under the complete control of an adversary. Recently, Jonathan et al presents two PAKE protocols which make the communication reduce to one-round. At the same time Jonathan's protocols achieve the mutual authentication and agreement the session key by constructing smooth projective hash functions. However Jonathan's two protocols are subjected to key compromise impersonation (KCI) attack. Based on these motivations, this paper firstly put forwards a framework one-round PAKE protocols. And then we propose a provably secure and flexible one-round PAKE scheme based on chaotic maps. Compared with Jonathan's two protocols, the results show that our one-round PAKE scheme can not only refrain from consuming modular exponential computing and scalar multiplication, but is also robust to resist various attacks, especially for KCI attack. Finally, we also give the provable security of our scheme.
引用
收藏
页码:104 / 118
页数:15
相关论文
共 50 条
  • [1] Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol
    Tso, Raylin
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02) : 863 - 874
  • [2] Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol
    Raylin Tso
    The Journal of Supercomputing, 2013, 66 : 863 - 874
  • [3] Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange
    Hwang, Jung Yeon
    Jarecki, Stanislaw
    Kwon, Taekyoung
    Lee, Joohee
    Shin, Ji Sun
    Xu, Jiayu
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 485 - 504
  • [4] Analysis of the SPEKE password-authenticated key exchange protocol
    Zhang, MX
    IEEE COMMUNICATIONS LETTERS, 2004, 8 (01) : 63 - 65
  • [5] Security analysis and enhancement for three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    Zhang, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 273 - 278
  • [6] Constant-round password-based authenticated key exchange protocol for dynamic groups
    Wu, Shuhua
    Zhu, Yuefei
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2008, 5143 : 69 - 82
  • [7] An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks
    Lo, Jung-Wen
    Lee, Ji-Zhe
    Hwang, Min-Shiang
    Chu, Yen-Ping
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (07): : 997 - 1004
  • [8] Security analysis on an improvement of RSA-based password authenticated key exchange
    Wang, SH
    Bao, F
    Wang, J
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (04) : 1641 - 1646
  • [9] Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
    Wei, Fushan
    Zhang, Zhenfeng
    Ma, Chuangui
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (09) : 1864 - 1871
  • [10] Proof of forward security for password-based authenticated key exchange
    Wu, Shuhua
    Zhu, Yuefei
    International Journal of Network Security, 2008, 7 (03) : 335 - 341