Efficient and secure password-based authentication protocols against guessing attacks

被引:9
|
作者
Kwon, T [1 ]
Song, J [1 ]
机构
[1] Yonsei Univ, Dept Comp Sci, Seoul 120749, South Korea
关键词
security; authentication; key exchange; cryptographic protocol; password;
D O I
10.1016/S0140-3664(98)00153-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose authentication and key exchange protocols which are both efficient and secure against password guessing attacks. Conventional authentication protocols have assumed that a strong secret should be shared between communicating participants, in the light of a threat of guessing attacks. A cryptographically long secret would be favored for security reasons, but it is not suitable for users to remember. Recent password-based protocols to defeat guessing attacks are more expensive than previous ones, in terms of the computation and communication costs. Using a one-time pad and a strong one-way hash function, we promote both security and efficiency. Thereby, we also verify our protocol formally. (C) 1998 Elsevier Science B.V.
引用
收藏
页码:853 / 861
页数:9
相关论文
共 50 条
  • [21] How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols
    Wang, Weijia
    Hu, Lei
    Li, Yong
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 218 - +
  • [22] PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage
    Zhang, Yuan
    Xu, Chunxiang
    Li, Hongwei
    Yang, Kan
    Cheng, Nan
    Shen, Xuemin
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (06) : 2297 - 2312
  • [23] Securing Password in Static Password-based Authentication: A Review
    Mohamedali, Intisar A.
    Fadlalla, Yahia
    PROCEEDINGS OF 2017 SUDAN CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (SCCSIT), 2017, : 98 - 102
  • [24] PASTA: PASsword-based Threshold Authentication
    Agrawal, Shashank
    Miao, Peihan
    Mohassel, Payman
    Mukherjee, Pratyay
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2042 - 2059
  • [25] Scalable, password-based and threshold authentication for smart homes
    Huszti, Andrea
    Kovacs, Szabolcs
    Olah, Norbert
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (04) : 707 - 723
  • [26] Password-based independent authentication and key exchange protocol
    Jung, KS
    Kim, JY
    Chung, TC
    ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1908 - 1912
  • [27] Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 51 - 63
  • [28] A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System
    Tian-Fu Lee
    I-Pin Chang
    Tsung-Hung Lin
    Ching-Cheng Wang
    Journal of Medical Systems, 2013, 37
  • [29] Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 179 - 196
  • [30] A password-based authentication approach for edge computing architectures
    Kenioua, Laid
    Lejdel, Brahim
    Alamri, Sultan
    Ramadan, Qusai
    EGYPTIAN INFORMATICS JOURNAL, 2024, 28