Password authenticated key exchange using quadratic residues

被引:0
作者
Zhang, MX [1 ]
机构
[1] Verizon Commun Inc, Waltham, MA 02451 USA
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS | 2004年 / 3089卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper investigates the feasibility of designing password-authenticated key exchange protocols using quadratic residues. To date, most of the published protocols for password-authenticated key exchange were based on the Diffie-Hellman key exchange. It appears inappropriate to design password-authenticated key exchange protocols using other public-key cryptographic techniques. In this paper, we show that protocols for password-authenticated key exchange can be constructed using quadratic residues and we present the first protocol of this type. Under the factoring assumption and the random oracle model, we show that our protocol is provably secure against off-line dictionary attacks. We also discuss the use of cache technique to improve the efficiency of our protocol.
引用
收藏
页码:233 / 247
页数:15
相关论文
共 50 条
  • [41] Efficient Password Authenticated Key Exchange via Oblivious Transfer
    Canetti, Ran
    Dachman-Soled, Dana
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 449 - 466
  • [42] Compact Password Authenticated Key Exchange from Group Actions
    Ishibashi, Ren
    Yoneyama, Kazuki
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 220 - 247
  • [43] IPAKE: Isomorphisms for password-based authenticated key exchange
    Catalano, D
    Pointcheval, D
    Pornin, T
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 477 - 493
  • [44] Owl: An Augmented Password-Authenticated Key Exchange Scheme
    Hao, Feng
    Bag, Samiran
    Chen, Liqun
    van Oorschot, Paul C.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2024, PT II, 2025, 14745 : 227 - 244
  • [45] IDMS quantum password-authenticated key exchange protocols
    Zhang, Lu
    Sun, Yan
    Xu, Yingfei
    Zhu, Hongfeng
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 25 (3-4) : 351 - 366
  • [46] Password mistyping in two-factor-authenticated Key Exchange
    Kolesnikovi, Vladimir
    Rackoff, Charles
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 702 - +
  • [47] Efficient password-authenticated key exchange based on RSA
    Park, Sangjoon
    Nam, Junghyun
    Kim, Seungjoo
    Won, Dongho
    TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 309 - +
  • [48] Efficient Client-to-Client Password Authenticated Key Exchange
    Yang, Yanjiang
    Bao, Feng
    Deng, Robert H.
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 202 - +
  • [49] ttPAKE: Typo tolerance password-authenticated key exchange
    Han, Yunxia
    Xu, Chunxiang
    Li, Shanshan
    Jiang, Changsong
    Chen, Kefei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 79
  • [50] Analysis of the SPEKE password-authenticated key exchange protocol
    Zhang, MX
    IEEE COMMUNICATIONS LETTERS, 2004, 8 (01) : 63 - 65