Security analysis and improvements of a universal construction for a round-optimal password authenticated key exchange protocol

被引:0
作者
Zhu, Hongfeng [1 ]
Wang, Xintong [1 ]
Chen, Yeh-Cheng [2 ]
Wang, Xueying [1 ]
机构
[1] Shenyang Normal Univ, Software Coll, 253 Huanghe Bei St, Shenyang 110034, Peoples R China
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA USA
关键词
authentication; key exchange; chaotic maps; one-round communication; key compromise impersonation; KCI;
D O I
10.1504/IJICS.2022.121293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key exchange (AKE) protocols enable two parties to generate a shared, cryptographically strong key while communicating over an insecure network under the complete control of an adversary. Recently, Jonathan et al presents two PAKE protocols which make the communication reduce to one-round. At the same time Jonathan's protocols achieve the mutual authentication and agreement the session key by constructing smooth projective hash functions. However Jonathan's two protocols are subjected to key compromise impersonation (KCI) attack. Based on these motivations, this paper firstly put forwards a framework one-round PAKE protocols. And then we propose a provably secure and flexible one-round PAKE scheme based on chaotic maps. Compared with Jonathan's two protocols, the results show that our one-round PAKE scheme can not only refrain from consuming modular exponential computing and scalar multiplication, but is also robust to resist various attacks, especially for KCI attack. Finally, we also give the provable security of our scheme.
引用
收藏
页码:104 / 118
页数:15
相关论文
共 50 条
  • [21] Revisit of Password-Authenticated Key Exchange Protocol for Healthcare Support Wireless Communication
    Kim, Mijin
    Moon, Jongho
    Won, Dongho
    Park, Namje
    ELECTRONICS, 2020, 9 (05)
  • [22] Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications
    Li Wenmin
    Wen Qiaoyan
    Su Qi
    Zhang Hua
    Jin Zhengping
    CHINA COMMUNICATIONS, 2012, 9 (01) : 64 - 72
  • [23] An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks
    Li, Wenmin
    Wen, Qiaoyan
    Su, Qi
    Jin, Zhengping
    Wang, Yanjiong
    AD HOC & SENSOR WIRELESS NETWORKS, 2012, 16 (1-3) : 29 - 44
  • [24] An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 850 - 853
  • [25] Breaking an improved password authenticated key exchange protocol for imbalanced wireless networks
    Zhang, MX
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (03) : 276 - 278
  • [26] Analysis and Improvement of an Authenticated Key Exchange Protocol
    Pan, Jiaxin
    Wang, Libin
    Ma, Changshe
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 417 - 431
  • [27] Efficient three-party password-based authenticated key exchange protocol
    Xu, C.-X., 1600, Univ. of Electronic Science and Technology of China (41): : 596 - 598+604
  • [28] Strongly password-based three-party authenticated key exchange protocol
    Lin, Yuanhui
    Hou, Mengbo
    Xu, Qiuliang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 555 - 558
  • [29] Universally Composable Gateway-Oriented Password-Authenticated Key Exchange Protocol
    Hu X.-X.
    Zhang Q.-H.
    Zhang Z.-F.
    Liu F.-M.
    Jisuanji Xuebao/Chinese Journal of Computers, 2017, 40 (05): : 1109 - 1120
  • [30] Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
    Kobara, K
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (10) : 2229 - 2237