Provably secure three-party password authenticated key exchange protocol in the standard model

被引:22
作者
Yang, Jun-Han [1 ]
Cao, Tian-Jie [1 ,2 ]
机构
[1] China Univ Min & Technol, Sch Comp, Xuzhou 221116, Jiangsu, Peoples R China
[2] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China
关键词
Standard model; 3PAKE; Provable security; Dictionary attack; Unknown key-share attack; Password-compromise impersonation attack;
D O I
10.1016/j.jss.2011.08.024
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Three-party password authenticated key exchange protocol is a very practical mechanism to establish secure session key through authenticating each other with the help of a trusted server. Most three-party password authenticated key exchange protocols only guarantee security in the random oracle model. However, a random oracle based cryptographic construction may be insecure when the oracle is replaced by real function. Moreover, some previous unknown attacks appear with the advance of the adversary capability. Therefore, a suitable standard model which can imitate a wider variety of attack scenarios for 3PAKE protocol is needed. Aim at resisting dictionary attack, unknown key-share attack and password-compromise impersonation attack, an expanded standard model for 3PAKE protocol is given. Meanwhile, through applying EIGamal encryption scheme and pseudorandom function, a specific three-party password authenticated key exchange protocol is proposed. The security of the proposed protocol is proven in the new standard model. The result shows that the present protocol has stronger security by comparing with other existing protocols, which covers the following security properties: (1) semantic security, (2) key privacy, (3) client-to-server authentication, (4) mutual authentication, (5) resistance to various known attacks, and (6) forward security. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:340 / 350
页数:11
相关论文
共 50 条
[31]   Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC [J].
Wu, Shuhua ;
Zhu, Yuefei ;
Pu, Qiong .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (04) :1329-1343
[32]   Efficient verifier-based password-authenticated key exchange in the three-party setting [J].
Kwon, Jeong Ok ;
Jeong, Ik Rae ;
Sakurai, Kouichi ;
Lee, Dong Hoon .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) :513-520
[33]   Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption [J].
Wang, Fengjiao ;
Zhang, Yuqing .
INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 :124-133
[35]   Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model [J].
Kobara, K ;
Imai, H .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (10) :2229-2237
[36]   Cryptanalysis of a Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography [J].
Pu, Qiong ;
Zhao, Xiuying ;
Ding, Jianmin .
2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, :7-10
[37]   A practical protocol for three-party authenticated quantum key distribution [J].
D. J. Guan ;
Yuan-Jiun Wang ;
E. S. Zhuang .
Quantum Information Processing, 2014, 13 :2355-2374
[38]   A practical protocol for three-party authenticated quantum key distribution [J].
Guan, D. J. ;
Wang, Yuan-Jiun ;
Zhuang, E. S. .
QUANTUM INFORMATION PROCESSING, 2014, 13 (11) :2355-2374
[39]   Provably secure authenticated key exchange protocol under the CDH assumption [J].
Zhao, Jianjie ;
Gu, Dawu .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (11) :2297-2304
[40]   Gateway-oriented password-authenticated key exchange protocol in the standard model [J].
Wei, Fushan ;
Zhang, Zhenfeng ;
Ma, Chuangui .
JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (03) :760-768