Security analysis and improvements of a universal construction for a round-optimal password authenticated key exchange protocol

被引:0
作者
Zhu, Hongfeng [1 ]
Wang, Xintong [1 ]
Chen, Yeh-Cheng [2 ]
Wang, Xueying [1 ]
机构
[1] Shenyang Normal Univ, Software Coll, 253 Huanghe Bei St, Shenyang 110034, Peoples R China
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA USA
关键词
authentication; key exchange; chaotic maps; one-round communication; key compromise impersonation; KCI;
D O I
10.1504/IJICS.2022.121293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key exchange (AKE) protocols enable two parties to generate a shared, cryptographically strong key while communicating over an insecure network under the complete control of an adversary. Recently, Jonathan et al presents two PAKE protocols which make the communication reduce to one-round. At the same time Jonathan's protocols achieve the mutual authentication and agreement the session key by constructing smooth projective hash functions. However Jonathan's two protocols are subjected to key compromise impersonation (KCI) attack. Based on these motivations, this paper firstly put forwards a framework one-round PAKE protocols. And then we propose a provably secure and flexible one-round PAKE scheme based on chaotic maps. Compared with Jonathan's two protocols, the results show that our one-round PAKE scheme can not only refrain from consuming modular exponential computing and scalar multiplication, but is also robust to resist various attacks, especially for KCI attack. Finally, we also give the provable security of our scheme.
引用
收藏
页码:104 / 118
页数:15
相关论文
共 50 条
  • [11] Design of a password-based authenticated key exchange protocol for SIP
    Mishra, Dheerendra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (23) : 16017 - 16038
  • [12] Simple and efficient password-based authenticated key exchange protocol
    Wang L.-B.
    Pan J.-X.
    Ma C.-S.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 459 - 465
  • [13] Simple and Efficient Password-Based Authenticated Key Exchange Protocol
    王立斌
    潘嘉昕
    马昌社
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (04) : 459 - 465
  • [14] Design of a password-based authenticated key exchange protocol for SIP
    Dheerendra Mishra
    Multimedia Tools and Applications, 2016, 75 : 16017 - 16038
  • [15] Simple three-party password authenticated key exchange protocol
    Lo N.-W.
    Yeh K.-H.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 600 - 603
  • [16] Weakness in a RSA-based password authenticated key exchange protocol
    Youn, Taek-Young
    Park, Young-Ho
    Kim, Changhan
    Lim, Jongin
    INFORMATION PROCESSING LETTERS, 2008, 108 (06) : 339 - 342
  • [17] Simple Three-Party Password Authenticated Key Exchange Protocol
    罗乃维
    叶国晖
    JournalofShanghaiJiaotongUniversity(Science), 2011, 16 (05) : 600 - 603
  • [18] Efficient password-based authenticated group key exchange protocol
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
    不详
    Dianzi Keji Diaxue Xuebao, 2009, 3 (393-396+414): : 393 - 396+414
  • [19] A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (11) : 3312 - 3324
  • [20] A communication-efficient three-party password authenticated key exchange protocol
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Wei-Pang
    INFORMATION SCIENCES, 2011, 181 (01) : 217 - 226