Secure key agreement protocols for three-party against guessing attacks

被引:64
|
作者
Sun, HM
Chen, BC
Hwang, T
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
cryptography; encrypted key exchange (EKE); three-party EKE; verifier-based; guessing attacks;
D O I
10.1016/j.jss.2003.11.017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Key exchange protocol is important for sending secret messages using the session key between two parties. In order to reach the objective, the premise is to generate a session key securely. Encryption key exchange was first proposed to generate a session key with a weak authenticated password against guessing attacks. Next, another authenticated key exchange protocols for three-party, two clients who request the session key and one server who authenticates the user's identity and assist in generating a session key, were proposed. In this paper, we focus on the three-party authenticated key exchange protocol. In addition to analyzing and improving a password-based authenticated key exchange protocol, a new verified-based protocol is also proposed. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
  • [1] Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks
    Kwon, Jeong Ok
    Sakurai, Kouichi
    Lee, Dong Hoon
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 1, PROCEEDINGS, 2006, 3991 : 977 - 980
  • [2] New Efficient Three-Party Quantum Key Distribution Protocols
    Shih, Han-Cheng
    Lee, Kuo-Chang
    Hwang, Tzonelih
    IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2009, 15 (06) : 1602 - 1606
  • [3] Secure authentication protocols resistant to guessing attacks
    Luo, Jia-Ning
    Shieh, Shiuhpyng
    Shen, Ji-Chiang
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (05) : 1125 - 1143
  • [4] Three-Party Quantum Key Agreement with Two-Photon Entanglement
    Yin, Xun-Ru
    Ma, Wen-Ping
    Liu, Wei-Yan
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (11) : 3915 - 3921
  • [5] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [6] Robust biometric-based three-party authenticated key establishment protocols
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (06) : 1144 - 1157
  • [7] Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols
    Gao, Fei
    Qin, Su-Juan
    Guo, Fen-Zhuo
    Wen, Qiao-Yan
    IEEE JOURNAL OF QUANTUM ELECTRONICS, 2011, 47 (05) : 630 - 635
  • [8] Token-based authenticated key establishment protocols for three-party communication
    Yoon, Eun-Jun
    Yoo, Kee-Young
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 758 - +
  • [9] Provably secure three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    INFORMATION SCIENCES, 2012, 184 (01) : 310 - 323
  • [10] Secure Verifier-Based Three-Party Key Exchange in the Random Oracle Model
    Chien, Hung-Yu
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (04) : 1487 - 1501