Password authenticated key exchange using quadratic residues

被引:0
作者
Zhang, MX [1 ]
机构
[1] Verizon Commun Inc, Waltham, MA 02451 USA
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS | 2004年 / 3089卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper investigates the feasibility of designing password-authenticated key exchange protocols using quadratic residues. To date, most of the published protocols for password-authenticated key exchange were based on the Diffie-Hellman key exchange. It appears inappropriate to design password-authenticated key exchange protocols using other public-key cryptographic techniques. In this paper, we show that protocols for password-authenticated key exchange can be constructed using quadratic residues and we present the first protocol of this type. Under the factoring assumption and the random oracle model, we show that our protocol is provably secure against off-line dictionary attacks. We also discuss the use of cache technique to improve the efficiency of our protocol.
引用
收藏
页码:233 / 247
页数:15
相关论文
共 50 条
  • [31] On password-based authenticated key exchange using collisionful hash functions
    Bakhtiari, S
    Safavi-Naini, R
    Pieprzyk, J
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 299 - 310
  • [32] Password-based Authenticated Key Exchange Scheme Using Smart Card
    Liu Hui
    Zhong Shaojun
    FIFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2012): COMPUTER VISION, IMAGE ANALYSIS AND PROCESSING, 2013, 8783
  • [33] More efficient password authenticated key exchange based on RSA
    Wong, DS
    Chan, AH
    Zhu, F
    PROGRESS IN CRYPTOLOGY -INDOCRYPT 2003, 2003, 2904 : 375 - 387
  • [34] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001
  • [35] Authenticated key exchange protocols resistant to password guessing attacks
    Kwon, T
    Song, J
    IEE PROCEEDINGS-COMMUNICATIONS, 1998, 145 (05): : 304 - 308
  • [36] CA based password-only authenticated key exchange
    Bhattacharryya, DK
    Nandi, S
    2000 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS: DESIGN AND IMPLEMENTATION, 2000, : 820 - 827
  • [37] Partitioned group password-based authenticated key exchange
    Vasco, María Isabel González (mariaisabel.vasco@urjc.es), 1912, Oxford University Press (60):
  • [38] Threshold password-authenticated key exchange (extended abstract)
    MacKenzie, P
    Shrimpton, T
    Jakobsson, M
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 385 - 400
  • [39] On Composability of Game-based Password Authenticated Key Exchange
    Skrobot, Marjan
    Lancrenon, Jean
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 443 - 457
  • [40] Partitioned Group Password-Based Authenticated Key Exchange
    Fiore, Dario
    Gonzalez Vasco, Maria Isabel
    Soriente, Claudio
    COMPUTER JOURNAL, 2017, 60 (12) : 1912 - 1922