Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol

被引:26
作者
Wu, Shuhua [1 ,2 ]
Pu, Qiong [3 ]
Wang, Shengbao [4 ]
He, Debiao [5 ]
机构
[1] Informat Engn Univ, Dept Network Engn, Zhengzhou, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Grad Univ, Beijing, Peoples R China
[3] Tongji Univ, CIMS Res Ctr, Shanghai 200092, Peoples R China
[4] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[5] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国博士后科学基金; 中国国家自然科学基金;
关键词
Password-based; Authenticated key exchange; Three-party; Dictionary attack; SERVER PUBLIC-KEYS; GUESSING ATTACKS; DIFFIE-HELLMAN; SECURE; AGREEMENT;
D O I
10.1016/j.ins.2012.06.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We revisit the communication-efficient three-party password authenticated key exchange protocol recently proposed by Chang et al. We show it is insecure against partition attacks, whereby the adversary can guess the correct password off-line. Thereafter we propose an enhanced protocol that can resist the attack described and yet is quite efficient. Furthermore, we prove its security in a widely accepted model. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:83 / 96
页数:14
相关论文
共 50 条
  • [31] Cryptanalysis of simple three-party key exchange protocol
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Xiyong
    COMPUTERS & SECURITY, 2008, 27 (1-2) : 16 - 21
  • [32] Cryptanalysis of a Simple Three-party Key Exchange Protocol
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2010, 34 (03): : 337 - 339
  • [33] Weaknesses of a Verifier-based Password-authenticated Key Exchange Protocol in the Three-party Setting
    Pu, Qiong
    Liu, Wei
    2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 3 - 6
  • [34] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [35] Password-based authenticated key exchange in the three-party setting
    Abdalla, M
    Fouque, PA
    Pointcheval, D
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 65 - 84
  • [36] THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES
    Yi, Xun
    Tso, Raylin
    Okamoto, Eiji
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 15 - 24
  • [37] Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
    Sahi, Agee
    Lai, David
    Li, Yan
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2018, 21 (04) : 560 - 581
  • [38] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chien-Ming Chen
    King-Hang Wang
    Kuo-Hui Yeh
    Bin Xiang
    Tsu-Yang Wu
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 3133 - 3142
  • [39] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Cheng-Chi Lee
    Chun-Ta Li
    Che-Wei Hsu
    Nonlinear Dynamics, 2013, 73 : 125 - 132
  • [40] An Efficient Password Security of Three-Party Key Exchange Protocol based on ECDLP
    Kar, Jayaprakash
    Majhi, Banshidhar
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (04): : 25 - 32