A novel three-party encrypted key exchange protocol

被引:68
作者
Chang, CC [1 ]
Chang, YF [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiai 621, Taiwan
关键词
EKE; key exchange protocol; 3PEKE;
D O I
10.1016/j.csi.2003.12.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The passwords people can remember are usually simple or meaningful. In three-party key exchange protocols with password authentication, clients are allowed to share an easy-to-remernber password with a trusted server such that two clients can communicate with each other through a common secret key without the existence of redundant keys. Such protocols are quite suitable for application when light-weight clients need secure communications. Steiner, Tsudik, and Waidner proposed a three-party protocol based on the encrypted key exchange (EKE) protocols in 1995; however, the proposed protocol suffered from off-line and undetectable on-line guessing attacks. In 2000, Lin, Sun, and Hwang proposed a secure three-party protocol with server's public keys. Because certificates are needed to verify the server's public keys to avoid impersonation attacks, this protocol is not practical for some environments. In 2001, Lin, Sun, Steiner and Hwang proposed a brand-new three-party protocol without servers' public keys. Nevertheless, more rounds are needed by using this protocol. In this paper, we propose a secure three-party EKE protocol with round efficiency. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:471 / 476
页数:6
相关论文
共 13 条
[1]  
[Anonymous], ACM OPERATING SYSTEM
[2]  
BELLARE M, LECT NOTES COMPUTER
[3]  
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[4]  
Cramer R, 1998, LECT NOTES COMPUT SC, V1462, P13, DOI 10.1007/BFb0055717
[5]  
Gertner Y, 2001, ANN IEEE SYMP FOUND, P126
[6]  
Goldreich O., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P25, DOI 10.1145/73007.73010
[7]  
Impagliazzo R., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P44, DOI 10.1145/73007.73012
[8]  
Lin C.L., 2000, ACM OPERATING SYSTEM, V34, P12
[9]   Three-party encrypted key exchange without server public-keys [J].
Lin, CL ;
Sun, HM ;
Steiner, M ;
Hwang, T .
IEEE COMMUNICATIONS LETTERS, 2001, 5 (12) :497-499
[10]  
Molva R, 1992, P 1992 EUR S RES COM, P1