Secure key agreement protocols for three-party against guessing attacks

被引:64
作者
Sun, HM
Chen, BC
Hwang, T
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
cryptography; encrypted key exchange (EKE); three-party EKE; verifier-based; guessing attacks;
D O I
10.1016/j.jss.2003.11.017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Key exchange protocol is important for sending secret messages using the session key between two parties. In order to reach the objective, the premise is to generate a session key securely. Encryption key exchange was first proposed to generate a session key with a weak authenticated password against guessing attacks. Next, another authenticated key exchange protocols for three-party, two clients who request the session key and one server who authenticates the user's identity and assist in generating a session key, were proposed. In this paper, we focus on the three-party authenticated key exchange protocol. In addition to analyzing and improving a password-based authenticated key exchange protocol, a new verified-based protocol is also proposed. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
[21]   Three-Party Quantum Secure Direct Communication Protocol with Adaptive Capacity [J].
Zhou, Yi-Hua ;
Chen, Ze-Song ;
Yang, Yu-Guang ;
Shi, Wei-Min ;
Xu, Yang .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (03)
[22]   Three-Party Quantum Network Communication Protocols Based on Quantum Teleportation [J].
Zhou, Nan-Run ;
Cheng, Hu-Lai ;
Gong, Li-Hua ;
Li, Chi-Sheng .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2014, 53 (04) :1387-1403
[23]   Practical Password-Authenticated Three-Party Key Exchange [J].
Kwon, Jeong Ok ;
Jeong, Ik Rae ;
Lee, Dong Hoon .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (06) :312-332
[24]   Multi-party key agreement protocols with cheater identification [J].
Tseng, YM .
APPLIED MATHEMATICS AND COMPUTATION, 2003, 145 (2-3) :551-559
[25]   A practical protocol for three-party authenticated quantum key distribution [J].
Guan, D. J. ;
Wang, Yuan-Jiun ;
Zhuang, E. S. .
QUANTUM INFORMATION PROCESSING, 2014, 13 (11) :2355-2374
[26]   Efficient three-party password-based key exchange scheme [J].
Lou, Der-Chyuan ;
Huang, Hui-Feng .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) :504-512
[27]   Cryptanalysis of tripartite and multi-party authenticated key agreement protocols [J].
Shim, Kyung-Ah ;
Woo, Sung Sik .
INFORMATION SCIENCES, 2007, 177 (04) :1143-1151
[28]   Three-party reference frame independent quantum key distribution protocol* [J].
Sekga, Comfort ;
Mafu, Mhlambululi .
CHINESE PHYSICS B, 2021, 30 (12)
[29]   An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps [J].
Farash, Mohammad Sabzinejad ;
Attari, Mahmoud Ahmadian .
NONLINEAR DYNAMICS, 2014, 77 (1-2) :399-411
[30]   An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps [J].
Mohammad Sabzinejad Farash ;
Mahmoud Ahmadian Attari .
Nonlinear Dynamics, 2014, 77 :399-411