Secure key agreement protocols for three-party against guessing attacks

被引:64
作者
Sun, HM
Chen, BC
Hwang, T
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
cryptography; encrypted key exchange (EKE); three-party EKE; verifier-based; guessing attacks;
D O I
10.1016/j.jss.2003.11.017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Key exchange protocol is important for sending secret messages using the session key between two parties. In order to reach the objective, the premise is to generate a session key securely. Encryption key exchange was first proposed to generate a session key with a weak authenticated password against guessing attacks. Next, another authenticated key exchange protocols for three-party, two clients who request the session key and one server who authenticates the user's identity and assist in generating a session key, were proposed. In this paper, we focus on the three-party authenticated key exchange protocol. In addition to analyzing and improving a password-based authenticated key exchange protocol, a new verified-based protocol is also proposed. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
[41]   Single-Photon Based Three-Party Quantum Secure Direct Communication with Identity Authentication [J].
Zhang, Qi ;
Du, Ming-Ming ;
Zhong, Wei ;
Sheng, Yu-Bo ;
Zhou, Lan .
ANNALEN DER PHYSIK, 2023, 536 (03)
[42]   Untraceable biometric-based three-party authenticated key exchange for dynamic systems [J].
Ngoc-Tu Nguyen ;
Chang, Chin-Chen .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (03) :644-663
[43]   Shared authentication token secure against replay and weak key attacks [J].
Yen, SM ;
Liao, KH .
INFORMATION PROCESSING LETTERS, 1997, 62 (02) :77-80
[44]   Transient Attacks Against the VMG-KLJN Secure Key Exchanger [J].
Ferdous, Shahriar ;
Kish, Laszlo B. .
FLUCTUATION AND NOISE LETTERS, 2024, 23 (01)
[45]   The general theory of three-party quantum secret sharing protocols over phase-damping channels [J].
Song, Ting-Ting ;
Wen, Qiao-Yan ;
Qin, Su-Juan ;
Zhang, Wei-Wei ;
Sun, Ying .
QUANTUM INFORMATION PROCESSING, 2013, 12 (10) :3291-3304
[46]   Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states [J].
Zhou, Ri-Gui ;
Zhang, Xiaoxue ;
Li, Fengxin .
QUANTUM INFORMATION PROCESSING, 2021, 20 (04)
[47]   Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs [J].
Hu, Chengyu ;
Liu, Pengtao ;
Guo, Shanqing .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) :681-692
[48]   Provably secure identity-based authenticated key agreement protocols in multiple PKG environment [J].
Xia S. ;
Quan J.-X. ;
Han W.-B. .
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (10) :2393-2399
[49]   Extended KCI attack against two-party key establishment protocols [J].
Tang, Qiang ;
Chen, Liqun .
INFORMATION PROCESSING LETTERS, 2011, 111 (15) :744-747
[50]   Device-independent quantum key distribution secure against collective attacks [J].
Pironio, Stefano ;
Acin, Antonio ;
Brunner, Nicolas ;
Gisin, Nicolas ;
Massar, Serge ;
Scarani, Valerio .
NEW JOURNAL OF PHYSICS, 2009, 11