Secure key agreement protocols for three-party against guessing attacks

被引:64
作者
Sun, HM
Chen, BC
Hwang, T
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
cryptography; encrypted key exchange (EKE); three-party EKE; verifier-based; guessing attacks;
D O I
10.1016/j.jss.2003.11.017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Key exchange protocol is important for sending secret messages using the session key between two parties. In order to reach the objective, the premise is to generate a session key securely. Encryption key exchange was first proposed to generate a session key with a weak authenticated password against guessing attacks. Next, another authenticated key exchange protocols for three-party, two clients who request the session key and one server who authenticates the user's identity and assist in generating a session key, were proposed. In this paper, we focus on the three-party authenticated key exchange protocol. In addition to analyzing and improving a password-based authenticated key exchange protocol, a new verified-based protocol is also proposed. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
[31]   Information leakage in three-party simultaneous quantum secure direct communication with EPR pairs [J].
Wang, Lian-Ying ;
Chen, Xiu-Bo ;
Xu, Gang ;
Yang, Yi-Xian .
OPTICS COMMUNICATIONS, 2011, 284 (07) :1719-1720
[32]   Cryptanalysis of a simple three-party password-based key exchange protocol [J].
Yoon, Eun-Jun ;
Yoo, Kee-Young .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) :532-542
[33]   Cryptanalysis of an efficient three-party password-based key exchange scheme [J].
Yoon, Eun-Jun ;
Yoo, Kee-Young .
2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 :3972-3979
[34]   Cryptanalysis of a three-party password-based authenticated key exchange protocol [J].
He, D. (hedebiao@163.com), 1600, Femto Technique Co., Ltd. (16)
[35]   COMPUTATIONAL TWO-PARTY CORRELATION: A DICHOTOMY FOR KEY-AGREEMENT PROTOCOLS [J].
Haitner, Iftach ;
Nissim, Kobbi ;
Omri, Eran ;
Shaltiel, Ronen ;
Silbak, Jad .
SIAM JOURNAL ON COMPUTING, 2020, 49 (06) :1041-1082
[36]   Fault tolerant three-party quantum secret sharing against collective noise [J].
Gu, Bin ;
Mu, Lili ;
Ding, Liuguan ;
Zhang, Chengyi ;
Li, Chuanqi .
OPTICS COMMUNICATIONS, 2010, 283 (15) :3099-3103
[37]   Untraceable biometric-based three-party authenticated key exchange for dynamic systems [J].
Ngoc-Tu Nguyen ;
Chin-Chen Chang .
Peer-to-Peer Networking and Applications, 2018, 11 :644-663
[38]   Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol [J].
Wu, Shuhua ;
Pu, Qiong ;
Wang, Shengbao ;
He, Debiao .
INFORMATION SCIENCES, 2012, 215 :83-96
[39]   Device Independent Quantum Key Distribution Using Three-Party Pseudo-Telepathy [J].
Basak, Jyotirmoy ;
Maitra, Arpita ;
Maitra, Subhamoy .
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019, 2019, 11898 :456-471
[40]   Single-Photon Based Three-Party Quantum Secure Direct Communication with Identity Authentication [J].
Zhang, Qi ;
Du, Ming-Ming ;
Zhong, Wei ;
Sheng, Yu-Bo ;
Zhou, Lan .
ANNALEN DER PHYSIK, 2023, 536 (03)