Privacy Preserving Three-party Authenticated Key Agreement Protocol using Smart Cards

被引:2
作者
Park, Suyeon [1 ]
Park, Hee-Joo [2 ]
机构
[1] Daegu Univ, Sch Comp IT Engn, Gyongsan, South Korea
[2] Kyungil Univ, Dept Cyber Secur, Gyongsan, South Korea
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2014年 / 8卷 / 04期
关键词
Authenticated key exchange; privacy-preserving; three-party protocol; smart card;
D O I
10.14257/ijsia.2014.8.4.28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
How to make people keep both security and privacy in communication networks has been a hot topic in recent years. Researchers proposed three party authenticated key agreement (3PAKA) protocols to answer this question, which allows two parties to agree a new secure session key with the help of a trusted server. Recently, Yang et al. proposed a provably secure 3PAKA protocol. However, this paper finds out Yang et al.'s protocol has a security weakness against password guessing attack and two lack properties in authentication for password updating phase and privacy preserving. Furthermore, we propose anew privacy preserving 3PAKA (P_ 3PAKA) protocol using smart cards to solve the security problems in Yang et al.'s protocol. It provides user anonymity and un-traceability by adopting dynamic identifier depending on each session's nonce. Comparing with other typical 3PAKA protocols, P_ 3PAKA protocol is more secure while maintaining efficiency.
引用
收藏
页码:307 / 320
页数:14
相关论文
共 21 条
[1]  
Bellare M., 1993, P ACM CCS, V93, P62, DOI DOI 10.1145/168588.168596
[2]   Cryptanalysis of a remote user authentication scheme using smart cards [J].
Chan, CK ;
Cheng, LM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) :992-993
[3]  
Chang C., 2008, P 2 INT C UB INF MAN, P329
[4]  
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]   Robust remote authentication scheme with smart cards [J].
Fan, CI ;
Chan, YC ;
Zhang, ZK .
COMPUTERS & SECURITY, 2005, 24 (08) :619-628
[7]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[8]   Design of improved password authentication and update scheme based on elliptic curve cryptography [J].
Islam, S. K. Hafizul ;
Biswas, G. P. .
MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) :2703-2717
[9]  
Jeon W, 2013, INT J SECUR APPL, V7, P1
[10]   Efficient multi-server password authenticated key agreement using smart cards [J].
Juang, WS .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) :251-255