Password-only authenticated key exchange between two agents in the four-party setting

被引:0
作者
Lee, Youngsook [1 ]
Nam, Junghyun [2 ]
Kwak, Jin [3 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Informat Secur Grp, Seoul, South Korea
[2] Konkuk Univ, Dept Comp Sci, Kong Ju, South Korea
[3] Soonchunhyang Univ, Dept Inform secur, Seoul, South Korea
来源
AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS | 2007年 / 4496卷
关键词
password; key exchange; authentication; inter-domain; agent;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Agent technology is emerging as a new software paradigm in the areas of distributed computing. The use of multiple agents is a common technique in agent-based systems. In distributed agent systems, it is often required for two agents to communicate securely over a public network. Authentication and key exchange are fundamental for establishing secure communication channels over public insecure networks. Password-based protocols for authenticated key exchange are designed to work even when user authentication is done via the use of passwords drawn from a small known set of values. There have been many protocols proposed over the years for password authenticated key exchange in the three-party scenario, in which two agents attempt to establish a secret key interacting with one same authentication server. However, little has been done for password authenticated key exchange in the more general and realistic four-party setting, where two clients (or, two agents) trying to establish a secret key are registered with different authentication servers. In this paper, we propose a new protocol designed carefully for four-party password authenticated key exchange that requires each agent only to remember a password shared with its authentication server.
引用
收藏
页码:616 / +
页数:2
相关论文
共 19 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] [Anonymous], ACM OPERATING SYSTEM
  • [3] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
  • [4] Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
  • [5] Bellare M., 1995, P 1 ACM C COMPUTER C, P62
  • [6] Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
  • [7] Bresson E., 2001, PROC 8 ACM C COMPUT, P255
  • [8] Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
  • [9] Nonmalleable cryptography
    Dolev, D
    Dwork, C
    Naor, M
    [J]. SIAM JOURNAL ON COMPUTING, 2000, 30 (02) : 391 - 437
  • [10] A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS
    GOLDWASSER, S
    MICALI, S
    RIVEST, RL
    [J]. SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 281 - 308