A Three-Party Password Authenticated Key Exchange Protocol Resistant to Stolen Smart Card Attacks

被引:3
作者
Chen, Chien-Ming [1 ]
Xu, Linlin [1 ]
Fang, Weicheng [1 ]
Wu, Tsu-Yang [1 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Sch Comp Sci & Technol, Harbin, Peoples R China
来源
ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1 | 2017年 / 63卷
基金
中国国家自然科学基金;
关键词
authentication; key exchange protocol; stolen smart card attacks; AGREEMENT PROTOCOL; CRYPTANALYSIS; IMPROVEMENT; SCHEME;
D O I
10.1007/978-3-319-50209-0_40
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authenticated Key Exchange (AKE) is an important cryptographic tool to establish a confidential channel between two or more entities over a public network. Various AKE protocols utilize smart cards to store sensitive contents which are normally used for authentication or session key generation. It assumed that smart cards come with a tamper-resistant property, but sensitive contents stored in it can still be extracted by side channel attacks. It means that if an adversary steals someones smart card, he may have chance to impersonate this victim or further launch another attacks. This kind of attack is called Stolen Smart Card Attack. In this paper, we propose a three-party password authentication key exchange protocol. Our design is secure against the stolen smart card attack. We also provide a security analysis to show our protocol is still secure if sensitive information which is stored in a smart card is extracted by an attacker.
引用
收藏
页码:331 / 336
页数:6
相关论文
共 22 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3570, P341
[2]   Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Shon, Taeshik ;
Sher, Muhammad ;
Farash, Mohammad Sabzinejad .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (06)
[3]  
Chen C.M., 2016, Journal of Network Intelligence, V1, P61
[4]   A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices [J].
Chen, Chien-Ming ;
Wang, King-Hang ;
Wu, Tsu-Yang ;
Pan, Jeng-Shyang ;
Sun, Hung-Min .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) :1318-1330
[5]  
Chen CM, 2002, IEICE T COMMUN, VE85B, P2519
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]   Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography [J].
Farash, Mohammad Sabzinejad ;
Kumari, Saru ;
Bakhtiari, Majid .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) :4485-4504
[9]   An Enhanced and Secure Three-party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems [J].
Farash, Mohammad Sabzinejad ;
Attari, Mahmoud Ahmadian .
INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (02) :143-150
[10]   An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 62 :1-8