An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks

被引:18
作者
Heydari, Mohammad [2 ]
Sadough, S. Mohammad Sajad [2 ]
Farash, Mohammad Sabzinejad [1 ]
Chaudhry, Shehzad Ashraf [3 ]
Mahmood, Khalid [3 ]
机构
[1] Kharazmi Univ, Fac Math Sci & Comp, Tehran, Iran
[2] Shahid Beheshti Univ, Dept Elect Engn, Tehran, Iran
[3] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
关键词
Authenticated key exchange protocol; Dictionary attack; Impersonation attack; Random oracle model; Provable security; CRYPTANALYSIS; AGREEMENT; MODEL;
D O I
10.1007/s11277-015-3123-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Three party password based authenticated key exchange protocol can sanction couple of clients to institute a protected session key through a server above an insecure communication link. Youn et al. (Telecommun Syst 52(2):1367-1376, 2013) proposed three-party efficient and robust authenticated key exchange scheme that incurs three rounds. They assert that their scheme is invincible against customary attacks. Moreover, they claimed the scheme is lightweight due to low communication, computation costs and incorporating authentication in three rounds. However, comprehensive analysis in this paper reveals that Youn et al.'s scheme is susceptible to impersonation attack. To overcome the security feebleness, this paper introduces a modest scheme which not only maintains round efficiency, communication and computation costs but it also offer comprehensive security to repel popular security attacks. The security of the proposed scheme is verified through random oracle model.
引用
收藏
页码:337 / 356
页数:20
相关论文
共 35 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3570, P341
[2]  
Bayar M, 2010, IEEE INT CON MULTI, P578, DOI 10.1109/ICME.2010.5583864
[3]   A communication-efficient three-party password authenticated key exchange protocol [J].
Chang, Ting-Yi ;
Hwang, Min-Shiang ;
Yang, Wei-Pang .
INFORMATION SCIENCES, 2011, 181 (01) :217-226
[4]   A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS [J].
Chen, Bae-Ling ;
Kuo, Wen-Chung ;
Wuu, Lih-Chyau .
INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01) :53-59
[5]   Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks [J].
Chen, Hsing-Bai ;
Chen, Tzung-Her ;
Lee, Wei-Bin ;
Chang, Chin-Chen .
COMPUTER STANDARDS & INTERFACES, 2008, 30 (1-2) :95-99
[6]  
Chien HY, 2011, J INF SCI ENG, V27, P1487
[7]   Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps [J].
Chien, Hung-Yu ;
Wu, Tzong-Chen .
COMPUTER JOURNAL, 2009, 52 (06) :646-655
[8]  
Farash M. S., 2013, ISC INT J INFORM SEC, V5, P1
[9]  
Farash M.S., 2014, INT J NETW SECUR, V16, P143
[10]  
Farash M.S., 2012, IACSIT INT J ENG TEC, V4, P321