Universally Composable Three Party Password-based Key Exchange Protocol

被引:0
作者
Deng Miaolei [1 ]
Ma Jianfeng [1 ]
Le Fulong [2 ]
机构
[1] Xidian Univ, Sch Comp, Xian 710071, Peoples R China
[2] Informat Engn Univ, Inst Sci, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Diffie-Hellman; attack; key exchange; universally composable; protocol; security; 3-PARTY;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Within the framework of universal composability, an appropriate ideal functionality that captures the basic security requirements of three party password-based key exchange was defined. An efficient real-word three party password-based key exchange protocol was also proposed. This protocol securely realizes the ideal functionality with respect to static party corruption. Thus it provides security guarantees under arbitrary composition with other protocols.
引用
收藏
页码:150 / 155
页数:6
相关论文
共 50 条
  • [21] Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
    Islam, S. K. Hafizul
    INFORMATION SCIENCES, 2015, 312 : 104 - 130
  • [22] Simple password-based three-party authenticated key exchange without server public keys
    Lee, Tian-Fu
    Hwang, Tzonelih
    INFORMATION SCIENCES, 2010, 180 (09) : 1702 - 1714
  • [23] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Lee, Cheng-Chi
    Li, Chun-Ta
    Hsu, Che-Wei
    NONLINEAR DYNAMICS, 2013, 73 (1-2) : 125 - 132
  • [24] Simple and Efficient Password-Based Authenticated Key Exchange Protocol
    王立斌
    潘嘉昕
    马昌社
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (04) : 459 - 465
  • [25] Simple and efficient password-based authenticated key exchange protocol
    Wang L.-B.
    Pan J.-X.
    Ma C.-S.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 459 - 465
  • [26] Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps
    Chien, Hung-Yu
    Wu, Tzong-Chen
    COMPUTER JOURNAL, 2009, 52 (06) : 646 - 655
  • [27] Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Kim, Moonseong
    Paik, Juryon
    Won, Dongho
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3244 - 3260
  • [28] An efficient three-party password-based key agreement protocol using extended chaotic maps
    Shu Jian
    CHINESE PHYSICS B, 2015, 24 (06)
  • [29] Universally Composable Symbolic Analysis of Group Key Exchange Protocol
    Zhang Zijian
    Zhu Liehuang
    Liao Lejian
    CHINA COMMUNICATIONS, 2011, 8 (02) : 59 - 65
  • [30] PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITHOUT TRUSTED THIRD PARTY FOR MULTI-SERVER ENVIRONMENTS
    Hsu, Chien-Lung
    Wu, Tzong-Sun
    Lin, Han-Yu
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (3A): : 1541 - 1555