Password-authenticated key exchange between clients with different passwords

被引:0
作者
Byun, JW [1 ]
Jeong, IR
Lee, DH
Park, CS
机构
[1] Korea Univ, CIST, Sungbuk Gu, Seoul 136701, South Korea
[2] Dankook Univ, Div Comp Sci & Elect, Cheonan, South Korea
来源
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS | 2002年 / 2513卷
关键词
password authentication; key exchange; cross-realm; Kerberos; dictionary attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most password-authenticated key exchange schemes in the literature provide an authenticated key exchange between a client and a server based on a pre-shared password. With a rapid change in modern communication environments, it is necessary to construct a secure end-to-end channel between clients, which is a quite different paradigm from the existing ones. In this paper we propose a new framework which provides a password-authenticated key exchange between clients based only on their two different passwords without any pre-shared secret, so called Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE). Security notions and types of possible attacks are newly defined according to the new framework. We prove our scheme is secure against all types of attacks considered in the paper. Two secure C2C-PAKE schemes are suggested, one in a cross-realm setting and the other in a single-server setting.
引用
收藏
页码:134 / 146
页数:13
相关论文
共 17 条
  • [1] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
  • [2] Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
  • [3] BOYD C, 1998, LECT NOTES COMPUTER, V1438, P344
  • [4] Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
  • [5] CRESCENZO GD, 2001, LNCS, V2200, P27
  • [6] TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS
    DENNING, DE
    SACCO, GM
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (08) : 533 - 536
  • [7] GOLDREICH O, 2001, LNCS, V2139, P408
  • [8] HUR M, 2001, INTERNET DRAFT MAY
  • [9] Strong password-only authenticated key exchange
    Jablon, D.P.
    [J]. Computer Communication Review, 1996, 26 (05): : 5 - 26
  • [10] Jaspan B, 1996, PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, P43