Password authenticated key exchange protocols among diverse network domains

被引:12
作者
Yeh, HT [1 ]
Sun, HM
机构
[1] So Taiwan Univ Technol, Dept Informat & Commun, Tainan 710, Taiwan
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
关键词
network security; authentication; key exchange; password guessing attacks; perfect forward secrecy; cryptography;
D O I
10.1016/j.compeleceng.2005.03.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Up to now, all papers in password-authenticated key exchange protocols are constrained to two-party or three-party models. Under these two models, the clients are registered or authenticated by the same server. However, in reality two communicants may register under two different servers. In this case, the above models are inefficient or not suitable any more. This paper will discuss password authenticated key exchange protocol where both communicants are registered in two distinct servers. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:175 / 189
页数:15
相关论文
共 19 条
  • [1] [Anonymous], IEEE S RES SEC PRIV
  • [2] Bellovin SM, 1993, P CCS, P244
  • [3] Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
  • [4] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [5] PROTECTING POORLY CHOSEN SECRETS FROM GUESSING ATTACKS
    GONG, L
    LOMAS, MA
    NEEDHAM, RM
    SALTZER, JH
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 648 - 656
  • [6] GONG L, 2000, P 8 IEEE COMP SEC FD, P24
  • [7] HALEVI S, 1999, ACM T INFORM SYST SE, V2, P25
  • [8] JABLON D, 1996, ACM COMPUT COMMUN RE, V20, P5
  • [9] Extended password key exchange protocols immune to dictionary attack
    Jablon, DP
    [J]. SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 248 - 255
  • [10] Katz J, 2001, LECT NOTES COMPUT SC, V2045, P475