A novel e-mail protocol using three-party password-authenticated key exchange

被引:3
|
作者
Chang, Chin-Chen [1 ]
Wu, Yu-Ching [1 ]
Chang, Shih-Chang [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
来源
SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS | 2008年
关键词
D O I
10.1109/SecTech.2008.34
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet, e-mail authentication becomes more and more important. However, many existing e-mail authentication protocols are not secure enough. In 2005, Sun et al. proposed two e-mail protocols and claimed that can provide perfect forward secrecy. In 2007,Raphael showed the weaknesses of the two e-mail protocols. The first protocol can't securely against unknown key-share attack and the second protocol can't provide the perfect forward secrecy. It was contradictory to Sun et al.'s claimed. Therefore in this paper, we propose a novel e-mail protocol using three party password-authenticated key exchange to conquer the weaknesses of Sun et al. 's protocols.
引用
收藏
页码:150 / 154
页数:5
相关论文
共 50 条
  • [21] Anonymous Three-Party Password-Authenticated Key Exchange Scheme for Telecare Medical Information Systems
    Xie, Qi
    Hu, Bin
    Dong, Na
    Wong, Duncan S.
    PLOS ONE, 2014, 9 (07):
  • [22] Improvement on the password authenticated three-party key agreement protocol
    Department of Security Technology and Management, Wufeng University, Chiayi 62153, Taiwan
    不详
    不详
    J. Comput. Inf. Syst., 1 (42-48): : 42 - 48
  • [23] A secure and efficient three-party password-based authenticated key exchange protocol
    He, Yong-Zhong
    Cai, Ying
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 280 - +
  • [24] Universally Composable Three-Party Password Authenticated Key Exchange
    Zhang, Qihui
    Hu, Xuexian
    Wei, Jianghong
    Liu, Wenfen
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 123 - 137
  • [25] A Secure Two-Party Password-Authenticated Key Exchange Protocol
    Saeed, Maryam
    Shahhoseini, Hadi Shahriar
    Mackvandi, Ali
    Rezaeinezhad, Mohammad Reza
    Naddafiun, Mansour
    Bidoki, Mohammad Zare
    2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2014, : 466 - 474
  • [26] A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    INFORMATION TECHNOLOGY AND CONTROL, 2015, 44 (04): : 404 - 409
  • [27] Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
    Wu, Shuhua
    Pu, Qiong
    Wang, Shengbao
    He, Debiao
    INFORMATION SCIENCES, 2012, 215 : 83 - 96
  • [28] Provably secure three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    INFORMATION SCIENCES, 2012, 184 (01) : 310 - 323
  • [29] Provably secure three-party password authenticated key exchange protocol in the standard model
    Yang, Jun-Han
    Cao, Tian-Jie
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (02) : 340 - 350
  • [30] Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol
    Lee, Youngsook
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 151 - 160