Provably secure three-party password authenticated key exchange protocol in the standard model

被引:22
作者
Yang, Jun-Han [1 ]
Cao, Tian-Jie [1 ,2 ]
机构
[1] China Univ Min & Technol, Sch Comp, Xuzhou 221116, Jiangsu, Peoples R China
[2] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China
关键词
Standard model; 3PAKE; Provable security; Dictionary attack; Unknown key-share attack; Password-compromise impersonation attack;
D O I
10.1016/j.jss.2011.08.024
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Three-party password authenticated key exchange protocol is a very practical mechanism to establish secure session key through authenticating each other with the help of a trusted server. Most three-party password authenticated key exchange protocols only guarantee security in the random oracle model. However, a random oracle based cryptographic construction may be insecure when the oracle is replaced by real function. Moreover, some previous unknown attacks appear with the advance of the adversary capability. Therefore, a suitable standard model which can imitate a wider variety of attack scenarios for 3PAKE protocol is needed. Aim at resisting dictionary attack, unknown key-share attack and password-compromise impersonation attack, an expanded standard model for 3PAKE protocol is given. Meanwhile, through applying EIGamal encryption scheme and pseudorandom function, a specific three-party password authenticated key exchange protocol is proposed. The security of the proposed protocol is proven in the new standard model. The result shows that the present protocol has stronger security by comparing with other existing protocols, which covers the following security properties: (1) semantic security, (2) key privacy, (3) client-to-server authentication, (4) mutual authentication, (5) resistance to various known attacks, and (6) forward security. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:340 / 350
页数:11
相关论文
共 50 条
[41]   Security analysis and enhancements of a three-party authenticated key agreement protocol [J].
Wang, Zhiheng ;
Huo, Zhanqiang ;
Shi, Wenbo .
ACTA SCIENTIARUM-TECHNOLOGY, 2015, 37 (03) :329-336
[42]   Three weaknesses in a simple three-party key exchange protocol [J].
Chung, Hao-Rung ;
Ku, Wei-Chi .
INFORMATION SCIENCES, 2008, 178 (01) :220-229
[43]   Cryptanalysis of simple three-party key exchange protocol [J].
Guo, Hua ;
Li, Zhoujun ;
Mu, Yi ;
Zhang, Xiyong .
COMPUTERS & SECURITY, 2008, 27 (1-2) :16-21
[44]   Cryptanalysis of a Simple Three-party Key Exchange Protocol [J].
He, Debiao ;
Chen, Jianhua ;
Hu, Jin .
INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2010, 34 (03) :337-339
[45]   Verifier-based anonymous password-authenticated key exchange protocol in the standard model [J].
Zhang, Qihui ;
Chaudhary, Pradeep ;
Kumari, Saru ;
Kong, Zhiyin ;
Liu, Wenfen .
MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) :3623-3640
[46]   Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol [J].
Kim, Hae-Jung ;
Yoon, Eun-Jun .
SECURITY TECHNOLOGY, 2011, 259 :167-+
[47]   Provably secure tripartite password protected key exchange protocol based on elliptic curves [J].
Lee, S ;
Hitchcock, Y ;
Park, Y ;
Moon, S .
SELECTED AREAS IN CRYPTOGRAPHY, 2006, 3897 :205-220
[48]   Efficient provably secure password-based explicit authenticated key agreement [J].
Ruan, Ou ;
Kumar, Neeraj ;
He, Debiao ;
Lee, Jong-Hyouk .
PERVASIVE AND MOBILE COMPUTING, 2015, 24 :50-60
[49]   A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing [J].
Wei, Fushan ;
Zhang, Ruijie ;
Ma, Chuangui .
FUNDAMENTA INFORMATICAE, 2018, 157 (1-2) :201-220
[50]   Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme [J].
Wu, Shuhua ;
Chen, Kefei ;
Pu, Qiong ;
Zhu, Yuefei .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (05) :674-686