Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

被引:0
作者
Kwon, Jeong Ok [1 ]
Sakurai, Kouichi
Lee, Dong Hoon
机构
[1] Kyushu Univ, Dept Comp Sci & Commun Engn, Fukuoka 812, Japan
[2] Korea Univ, Ctr Info Security Tech, Seoul, South Korea
来源
COMPUTATIONAL SCIENCE - ICCS 2006, PT 1, PROCEEDINGS | 2006年 / 3991卷
关键词
cryptography; password-authenticated key exchange; dictionary attacks; round complexity; mobile network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A password-authenticated key exchange (PAKE) protocol in the three-party setting allows two users communicating over a public network to agree on a common session key by the help of a server. In the setting the users do not share a password between themselves, but only with the server. In this paper, we explore the possibility of designing a round-efficient three-party PAKE protocol with a method to protect against undetectable on-line dictionary attacks without using the random oracle. The protocol matches the most efficient three-party PAKE protocol secure against undetectable on-line dictionary attacks among those found in the literature while providing the same level of security. Finally, we indentify the relations between detectable on-line and undetectable on-line dictionary attacks by providing counter-examples to support the observed relations(1).
引用
收藏
页码:977 / 980
页数:4
相关论文
共 35 条
  • [31] Untraceable biometric-based three-party authenticated key exchange for dynamic systems
    Ngoc-Tu Nguyen
    Chin-Chen Chang
    Peer-to-Peer Networking and Applications, 2018, 11 : 644 - 663
  • [32] Untraceable biometric-based three-party authenticated key exchange for dynamic systems
    Ngoc-Tu Nguyen
    Chang, Chin-Chen
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (03) : 644 - 663
  • [33] Cryptanalysis of Guo et al.'s three-party password-based authenticated key exchange (G-3PAKE) protocol
    Choi, Sung-Bae
    Yoon, Eun-Jun
    INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING 2011, 2011, 24 : 187 - 191
  • [34] A Provably Secure Three-Party Password Authenicated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems
    Wei, Fushan
    Ma, Jianfeng
    Ge, Aijun
    Li, Guangsong
    Ma, Chuangui
    INFORMATION TECHNOLOGY AND CONTROL, 2015, 44 (02): : 195 - 205
  • [35] A Construction of Three Party Post Quantum Secure Authenticated Key Exchange Using Ring Learning With Errors and ECC Cryptography
    Chaudhary, Dharminder
    Kumar, Uddeshaya
    Saleem, Kashif
    IEEE ACCESS, 2023, 11 : 136947 - 136957