Security analysis and improvements of a universal construction for a round-optimal password authenticated key exchange protocol

被引:0
作者
Zhu, Hongfeng [1 ]
Wang, Xintong [1 ]
Chen, Yeh-Cheng [2 ]
Wang, Xueying [1 ]
机构
[1] Shenyang Normal Univ, Software Coll, 253 Huanghe Bei St, Shenyang 110034, Peoples R China
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA USA
关键词
authentication; key exchange; chaotic maps; one-round communication; key compromise impersonation; KCI;
D O I
10.1504/IJICS.2022.121293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key exchange (AKE) protocols enable two parties to generate a shared, cryptographically strong key while communicating over an insecure network under the complete control of an adversary. Recently, Jonathan et al presents two PAKE protocols which make the communication reduce to one-round. At the same time Jonathan's protocols achieve the mutual authentication and agreement the session key by constructing smooth projective hash functions. However Jonathan's two protocols are subjected to key compromise impersonation (KCI) attack. Based on these motivations, this paper firstly put forwards a framework one-round PAKE protocols. And then we propose a provably secure and flexible one-round PAKE scheme based on chaotic maps. Compared with Jonathan's two protocols, the results show that our one-round PAKE scheme can not only refrain from consuming modular exponential computing and scalar multiplication, but is also robust to resist various attacks, especially for KCI attack. Finally, we also give the provable security of our scheme.
引用
收藏
页码:104 / 118
页数:15
相关论文
共 50 条
  • [31] Two-factor Password-authenticated Key Exchange with End-to-end Security
    Jarecki, Stanislaw
    Jubur, Mohammed
    Krawczyk, Hugo
    Saxena, Nitesh
    Shirvanian, Maliheh
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (03)
  • [32] Improvement on pretty-simple password authenticated key-exchange protocol for wireless networks
    Chang, TY
    Yang, CC
    Chen, CM
    INFORMATICA, 2004, 15 (02) : 161 - 170
  • [33] Verifier-based anonymous password-authenticated key exchange protocol in the standard model
    Zhang, Qihui
    Chaudhary, Pradeep
    Kumari, Saru
    Kong, Zhiyin
    Liu, Wenfen
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 3623 - 3640
  • [34] Security analysis of the generalized key agreement and password authentication protocol
    Yeh, HT
    Sun, HM
    Hwang, T
    IEEE COMMUNICATIONS LETTERS, 2001, 5 (11) : 462 - 463
  • [35] PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITHOUT TRUSTED THIRD PARTY FOR MULTI-SERVER ENVIRONMENTS
    Hsu, Chien-Lung
    Wu, Tzong-Sun
    Lin, Han-Yu
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (3A): : 1541 - 1555
  • [36] Analysis and improvement of an authenticated key exchange protocol for sensor networks
    Tian, XJ
    Wong, DS
    Zhu, RW
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (11) : 970 - 972
  • [37] Cryptanalysis and Enhancement of Modified Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
    Shim, Kyung-Ah
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (12) : 3837 - 3839
  • [38] A Three-Party Password Authenticated Key Exchange Protocol Resistant to Stolen Smart Card Attacks
    Chen, Chien-Ming
    Xu, Linlin
    Fang, Weicheng
    Wu, Tsu-Yang
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, 2017, 63 : 331 - 336
  • [39] Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks
    Chien, Hung-Yu
    Wu, Tzong-Chen
    Yeh, Ming-Kuei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (02) : 249 - 265
  • [40] A round- and computation-efficient three-party authenticated key exchange protocol
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chen, Hsing-Bai
    JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (09) : 1581 - 1590