Scalable protocol for cross-domain group password-based authenticated key exchange

被引:6
|
作者
Guo, Cong [1 ]
Zhang, Zijian [1 ]
Zhu, Liehuang [1 ]
Tan, Yu-an [1 ]
Yang, Zhen [1 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing Engn Res Ctr Mass Language Informat Proc, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
cross-domain; password-based authenticated key exchange (PAKE); group key exchange; Real-Or-Random (ROR) model; provable secure; SECURE; SYSTEM;
D O I
10.1007/s11704-014-4124-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cross-domain password-based authenticated key exchange (PAKE) protocols have been studied for many years. However, these protocols are mainly focusing on multi-participant within a single domain in an open network environment. This paper proposes a novel approach for designing a cross-domain group PAKE protocol, that primarily handles with the setting of multi-participant in the multi-domain. Moreover, our protocol is proved secure against active adversary in the Real-or-Random (ROR) model. In our protocol, no interaction occurs between any two domain authentication servers. They are regarded as ephemeral certificate authorities (CAs) to certify key materials that participants might subsequently use to exchange and agree on group session key. We further justify the computational complexity and measure the average computation time of our protocol. To the best of our knowledge, this is the first work to analyze and discuss a provably secure multi-participant cross-domain group PAKE protocol.
引用
收藏
页码:157 / 169
页数:13
相关论文
共 50 条
  • [31] Efficient password-based authenticated key agreement protocol
    Lee, SW
    Kim, WH
    Kim, HS
    Yoo, KY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 617 - 626
  • [32] Strongly password-based three-party authenticated key exchange protocol
    Lin, Yuanhui
    Hou, Mengbo
    Xu, Qiuliang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 555 - 558
  • [33] A password-based authenticated key exchange protocol for mobile-commerce environments
    Fan, Ya-Jun
    Wen, Qiao-Yan
    Jin, Zheng-Ping
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2010, 33 (06): : 64 - 67
  • [34] Efficient password-based authenticated key exchange protocol under standard model
    Shu, Jian
    Xu, Chun-Xiang
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (11): : 2716 - 2719
  • [35] Cryptanalysis of a three-party password-based authenticated key exchange protocol
    He, D. (hedebiao@163.com), 1600, Femto Technique Co., Ltd. (16):
  • [36] An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 850 - 853
  • [37] Constant-round password-based authenticated key exchange protocol for dynamic groups
    Wu, Shuhua
    Zhu, Yuefei
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2008, 5143 : 69 - 82
  • [38] Provably secure three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    INFORMATION SCIENCES, 2012, 184 (01) : 310 - 323
  • [39] A secure and efficient three-party password-based authenticated key exchange protocol
    He, Yong-Zhong
    Cai, Ying
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 280 - +
  • [40] A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    INFORMATION TECHNOLOGY AND CONTROL, 2015, 44 (04): : 404 - 409