IMPROVING TWO NOVEL THREE-PARTY ENCRYPTED KEY EXCHANGE PROTOCOLS WITH PERFECT FORWARD SECRECY

被引:9
作者
Lee, Cheng-Chi [1 ]
Chang, Rui-Xiang [2 ]
Ko, Hsien-Ju [2 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, Sinjhuang City 24205, Taipei County, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
关键词
Authentication; three-party encrypted key exchange; password guessing attack; password; GUESSING ATTACKS;
D O I
10.1142/S0129054110007672
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It is a crucial that password security be effective and constantly improved. The three-party encrypted key exchange (3PEKE) protocol has been used to protect passwords transmitted between users. Recently, Chang and Chang proposed a novel 3PEKE (ECC-3PEKE) protocol using a super-poly-to-one trapdoor function which demonstrates high efficiency. However, Chen et al. and Yoon et al., respectively, showed that the ECC-3PEKE protocol can not prevent undetectable on-line password guessing attacks and proposed improved protocols. Unfortunately, their improved protocols suffer from off-line password guessing attacks without perfect forward secrecy. Hence, the authors propose an improved protocol to strengthen their security.
引用
收藏
页码:979 / 991
页数:13
相关论文
共 50 条
  • [1] Cryptanalysis of two three-party encrypted key exchange protocols
    Lo, N. W.
    Yeh, Kuo-Hui
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1167 - 1174
  • [2] Improving the novel three-party encrypted key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (05) : 309 - 314
  • [3] A Computation-Efficient Three-Party Encrypted Key Exchange Protocol
    Lee, Cheng-Chi
    Chen, Shun-Der
    Chen, Chin-Ling
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 573 - 579
  • [4] Efficient three-party encrypted key exchange using trapdoor functions
    Lee, Tian-Fu
    Chang, I-Pin
    Wang, Ching-Cheng
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (11) : 1353 - 1358
  • [5] Efficient three-party key exchange protocols with round efficiency
    Taek-Young Youn
    Eun Sook Kang
    Changhoon Lee
    Telecommunication Systems, 2013, 52 : 1367 - 1376
  • [6] Efficient three-party key exchange protocols with round efficiency
    Youn, Taek-Young
    Kang, Eun Sook
    Lee, Changhoon
    TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 1367 - 1376
  • [7] Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
    Chen, Hsing-Bai
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chang, Chin-Chen
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (1-2) : 95 - 99
  • [8] Three-party encrypted key exchange without server public-keys
    Lin, CL
    Sun, HM
    Steiner, M
    Hwang, T
    IEEE COMMUNICATIONS LETTERS, 2001, 5 (12) : 497 - 499
  • [9] Enhanced three-party encrypted key exchange without server public keys
    Lee, TF
    Hwang, T
    Lin, CL
    COMPUTERS & SECURITY, 2004, 23 (07) : 571 - 577
  • [10] Password-based authentication and key distribution protocols with perfect forward secrecy
    Sun, Hung-Min
    Yeh, Her-Tyan
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 1002 - 1011