IMPROVING TWO NOVEL THREE-PARTY ENCRYPTED KEY EXCHANGE PROTOCOLS WITH PERFECT FORWARD SECRECY

被引:9
作者
Lee, Cheng-Chi [1 ]
Chang, Rui-Xiang [2 ]
Ko, Hsien-Ju [2 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, Sinjhuang City 24205, Taipei County, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
关键词
Authentication; three-party encrypted key exchange; password guessing attack; password; GUESSING ATTACKS;
D O I
10.1142/S0129054110007672
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It is a crucial that password security be effective and constantly improved. The three-party encrypted key exchange (3PEKE) protocol has been used to protect passwords transmitted between users. Recently, Chang and Chang proposed a novel 3PEKE (ECC-3PEKE) protocol using a super-poly-to-one trapdoor function which demonstrates high efficiency. However, Chen et al. and Yoon et al., respectively, showed that the ECC-3PEKE protocol can not prevent undetectable on-line password guessing attacks and proposed improved protocols. Unfortunately, their improved protocols suffer from off-line password guessing attacks without perfect forward secrecy. Hence, the authors propose an improved protocol to strengthen their security.
引用
收藏
页码:979 / 991
页数:13
相关论文
共 50 条
  • [41] Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
    Xiong, Hu
    Chen, Yanan
    Guan, Zhi
    Chen, Zhong
    INFORMATION SCIENCES, 2013, 235 : 329 - 340
  • [42] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho CHOU
    Kuo-yu TSAI
    Tzong-chen WU
    Kuo-hui YEH
    JournalofZhejiangUniversity-ScienceC(Computers&Electronics), 2013, 14 (05) : 347 - 355
  • [43] An Efficient Three-Party Authentication Key Exchange Protocol for Wireless Sensor Networks
    Li, Hongtu
    Hu, Liang
    Chu, Jianfeng
    Chi, Ling
    Li, Hongwei
    SENSOR LETTERS, 2013, 11 (05) : 990 - 996
  • [44] Hybrid Protocol for Password-based Key Exchange in Three-party Setting
    He Xinzheng
    Ru Bei
    Fei Jinlong
    Xun Baocheng
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 119 - +
  • [45] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho Chou
    Kuo-yu Tsai
    Tzong-chen Wu
    Kuo-hui Yeh
    Journal of Zhejiang University SCIENCE C, 2013, 14 : 347 - 355
  • [46] An enhanced three-party authentication key exchange protocol for mobile commerce environments
    Tan Z.
    Journal of Communications, 2010, 5 (05): : 436 - 443
  • [47] Efficient three-party password-based authenticated key exchange protocol
    Xu, C.-X., 1600, Univ. of Electronic Science and Technology of China (41): : 596 - 598+604
  • [48] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chou, Chih-ho
    Tsai, Kuo-yu
    Wu, Tzong-chen
    Yeh, Kuo-hui
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (05): : 347 - 355
  • [49] Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting
    Wu, Shuhua
    Zhu, Yuefei
    Network and Parallel Computing, 2008, 5245 : 105 - 115
  • [50] Provably secure three party encrypted key exchange scheme with explicit authentication
    Tsai, Hao-Chuan
    Chang, Chin-Chen
    INFORMATION SCIENCES, 2013, 238 : 242 - 249