Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol

被引:26
作者
Wu, Shuhua [1 ,2 ]
Pu, Qiong [3 ]
Wang, Shengbao [4 ]
He, Debiao [5 ]
机构
[1] Informat Engn Univ, Dept Network Engn, Zhengzhou, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Grad Univ, Beijing, Peoples R China
[3] Tongji Univ, CIMS Res Ctr, Shanghai 200092, Peoples R China
[4] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[5] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国博士后科学基金; 中国国家自然科学基金;
关键词
Password-based; Authenticated key exchange; Three-party; Dictionary attack; SERVER PUBLIC-KEYS; GUESSING ATTACKS; DIFFIE-HELLMAN; SECURE; AGREEMENT;
D O I
10.1016/j.ins.2012.06.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We revisit the communication-efficient three-party password authenticated key exchange protocol recently proposed by Chang et al. We show it is insecure against partition attacks, whereby the adversary can guess the correct password off-line. Thereafter we propose an enhanced protocol that can resist the attack described and yet is quite efficient. Furthermore, we prove its security in a widely accepted model. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:83 / 96
页数:14
相关论文
共 50 条
  • [41] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho CHOU
    Kuo-yu TSAI
    Tzong-chen WU
    Kuo-hui YEH
    JournalofZhejiangUniversity-ScienceC(Computers&Electronics), 2013, 14 (05) : 347 - 355
  • [42] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho Chou
    Kuo-yu Tsai
    Tzong-chen Wu
    Kuo-hui Yeh
    Journal of Zhejiang University SCIENCE C, 2013, 14 : 347 - 355
  • [43] Efficient verifier-based password-authenticated key exchange in the three-party setting
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Sakurai, Kouichi
    Lee, Dong Hoon
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 513 - 520
  • [44] Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    Kumari, Saru
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [45] Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol
    Kim, Hae-Jung
    Yoon, Eun-Jun
    SECURITY TECHNOLOGY, 2011, 259 : 167 - +
  • [46] Universally composable three-party password-authenticated key exchange with contributiveness
    Hu, Xuexian
    Zhang, Zhenfeng
    Zhang, Qihui
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (06) : 1100 - 1111
  • [47] A round- and computation-efficient three-party authenticated key exchange protocol
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chen, Hsing-Bai
    JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (09) : 1581 - 1590
  • [48] How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols
    Wang, Weijia
    Hu, Lei
    Li, Yong
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 218 - +
  • [49] Enhanced password-based simple three-party key exchange protocol
    Kim, Hyun-Seok
    Choi, Jin-Young
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 107 - 114
  • [50] Analysis of Two Pairing-based Three-party Password Authenticated Key Exchange Protocols
    Phan, Raphael C. -W.
    Yau, Wei-Chuen
    Goi, Bok-Min
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 102 - +