Security analysis and improvements of a universal construction for a round-optimal password authenticated key exchange protocol

被引:0
作者
Zhu, Hongfeng [1 ]
Wang, Xintong [1 ]
Chen, Yeh-Cheng [2 ]
Wang, Xueying [1 ]
机构
[1] Shenyang Normal Univ, Software Coll, 253 Huanghe Bei St, Shenyang 110034, Peoples R China
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA USA
关键词
authentication; key exchange; chaotic maps; one-round communication; key compromise impersonation; KCI;
D O I
10.1504/IJICS.2022.121293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key exchange (AKE) protocols enable two parties to generate a shared, cryptographically strong key while communicating over an insecure network under the complete control of an adversary. Recently, Jonathan et al presents two PAKE protocols which make the communication reduce to one-round. At the same time Jonathan's protocols achieve the mutual authentication and agreement the session key by constructing smooth projective hash functions. However Jonathan's two protocols are subjected to key compromise impersonation (KCI) attack. Based on these motivations, this paper firstly put forwards a framework one-round PAKE protocols. And then we propose a provably secure and flexible one-round PAKE scheme based on chaotic maps. Compared with Jonathan's two protocols, the results show that our one-round PAKE scheme can not only refrain from consuming modular exponential computing and scalar multiplication, but is also robust to resist various attacks, especially for KCI attack. Finally, we also give the provable security of our scheme.
引用
收藏
页码:104 / 118
页数:15
相关论文
共 50 条
  • [41] CCAKESC: Chaotic map-based construction of a new authenticated key exchange protocol for satellite communication
    Kumar, Uddeshaya
    Garg, Manish
    INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2022, 40 (03) : 218 - 229
  • [42] An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model
    Wei, Fushan
    Ma, Jianfeng
    Zhang, Ruijie
    Ma, Chuangui
    Wang, Xuan
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (07)
  • [43] Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
    Hu, Xuexian
    Zhang, Zhenfeng
    NONLINEAR DYNAMICS, 2014, 78 (02) : 1293 - 1300
  • [44] Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps
    Abbasinezhad-Mood, Dariush
    Nikooghadam, Morteza
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (11) : 4815 - 4828
  • [45] Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
    Xuexian Hu
    Zhenfeng Zhang
    Nonlinear Dynamics, 2014, 78 : 1293 - 1300
  • [46] An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model
    Fushan WEI
    Jianfeng MA
    Ruijie ZHANG
    Chuangui MA
    Xuan WANG
    ScienceChina(InformationSciences), 2017, 60 (07) : 130 - 143
  • [47] ON SECURITY OF A PRACTICAL THREE-PARTY KEY EXCHANGE PROTOCOL WITH ROUND EFfiCIENCY
    Lee, Cheng-Chi
    Chang, Ya-Fen
    INFORMATION TECHNOLOGY AND CONTROL, 2008, 37 (04): : 333 - 335
  • [48] Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    Hwang, Min-Shiang
    Li, Chun-Ta
    Chu, Yen-Ping
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (03): : 227 - 234
  • [50] Analysis of Two Pairing-based Three-party Password Authenticated Key Exchange Protocols
    Phan, Raphael C. -W.
    Yau, Wei-Chuen
    Goi, Bok-Min
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 102 - +