ECC-Based Password-Authenticated Key Exchange in the Three-Party Setting

被引:0
作者
Tingting Liu
Qiong Pu
Yong Zhao
Shuhua Wu
机构
[1] Zhengzhou Information Science and Technology Institute,CIMS Research Center
[2] Tongji University,College of Computer Science
[3] Beijing University of Technology,undefined
来源
Arabian Journal for Science and Engineering | 2013年 / 38卷
关键词
Password-based; Authenticated key exchange; Three-party; Dictionary attack; Elliptic curve;
D O I
暂无
中图分类号
学科分类号
摘要
This paper investigates three-party password authenticated key exchange protocols using elliptic curve cryptosystem (ECC). We first show that the direct elliptic curve analog of Chien’s protocol proposed most recently is vulnerable to off-line dictionary attack. Thereafter, we present an enhanced protocol based on ECC. Our proposal can defeat password-guessing attacks and the stolen-verifier attacks. And yet, it is also efficient. Furthermore, we can provide the rigorous proof of the security for it. Therefore, the protocol is quite popular in low resource environments.
引用
收藏
页码:2069 / 2077
页数:8
相关论文
共 28 条
[1]  
Lu R.X.(2007)Simple three-party key exchange protocol Comput. Secur. 26 94-97
[2]  
Cao Z.F(2009)Provably secure password-based three-party key exchange with optimal message steps Comput. J. 52 646-655
[3]  
Chien H.Y.(2009)A simple three-party password-based key exchange protocol Int. J. Commun. Syst. 22 857-862
[4]  
Wu T.C(2010)An improvement on a three-party password-based key exchange protocol using weil pairing Int. J. Netw. Secur. 11 17-22
[5]  
Huang H.-F(2010)An advanced password authenticated key exchange protocol for imbalanced wireless networks J. Internet Technol. 11 997-1004
[6]  
Zeng Y.(2010)Simple password-based three-party authenticated key exchange without server public keys Inf. Sci. 180 1702-1714
[7]  
Ma J.(2011)A communication- efficient three-party password authenticated key exchange protocol Inf. Sci. 181 217-226
[8]  
Moon S(2011)Secure verifier-based three-party key exchange in the random oracle model J. Inf. Sci. Eng. 27 1487-1501
[9]  
Lo J.-W.(2011)Efficient three-party password-based key exchange scheme Int. J. Commun. Syst. 24 504-512
[10]  
Lee J.-Z.(2008)Three weaknesses in a simple three-party key exchange protocol Inf. Sci. 178 220-229