Cryptanalysis of an efficient three-party password-based key exchange scheme

被引:3
|
作者
Yoon, Eun-Jun [1 ]
Yoo, Kee-Young [1 ]
机构
[1] Kyungil Univ, Dept Cyber Secur, Gyongsan, South Korea
关键词
Cryptography; Key exchange; Password; Three-party; authentication; PROTOCOL;
D O I
10.1016/j.proeng.2012.01.604
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In order to secure communications between two clients with a trusted server's help in public network environments, a three-party password-based authenticated key exchange (3PAKE) scheme is used to provide the transaction confidentiality and efficiency. In 2010, Lou-Huang proposed a new simple three-party password-based authenticated key exchange (LH-3PAKE) scheme based on elliptic curve cryptography (ECC). By analysis, Lou-Huang claimed that the proposed LH-3PAKE scheme is not only secure against various attacks, but also more efficient than previously proposed 3PAKE schemes. However, this paper demonstrates LH-3PAKE scheme is vulnerable to off-line password guessing attacks by an attacker. c (C)2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Harbin University of Science and Technology
引用
收藏
页码:3972 / 3979
页数:8
相关论文
共 50 条
  • [31] Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol
    Wang, Qingping
    Ruan, Ou
    Wang, Zihao
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 497 - 508
  • [32] Provably leakage-resilient three-party password-based authenticated key exchange
    Ruan, Ou
    Wang, Qingping
    Wang, Zihao
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (01) : 163 - 173
  • [33] Re-attack on a three-party password-based authenticated key exchange protocol
    Liang, Haiquan
    Hu, Jingtai
    Wu, Shuhua
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (5-6) : 1175 - 1183
  • [34] Security analysis and enhancement for three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    Zhang, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 273 - 278
  • [35] Provably leakage-resilient three-party password-based authenticated key exchange
    Ou Ruan
    Qingping Wang
    Zihao Wang
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 163 - 173
  • [36] Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE
    Liu, Chao
    Zheng, Zhongxiang
    Jia, Keting
    You, Qidi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 56 - 72
  • [37] Provably Secure Password-based Three-party Key Exchange Protocol with Computation Efficiency
    Fu, Jih-Ming
    Lin, Jeng-Ping
    Wang, Ren-Chiun
    LIFE SCIENCE JOURNAL-ACTA ZHENGZHOU UNIVERSITY OVERSEAS EDITION, 2011, 8 (04): : 394 - 401
  • [38] A method for making three-party password-based key exchange resilient to server compromise
    Zhu Hongfeng
    Liu Tianhua
    Re, Liu
    Chang Guiran
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 546 - +
  • [39] Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    Kumari, Saru
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [40] An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    NONLINEAR DYNAMICS, 2014, 77 (1-2) : 399 - 411