A novel e-mail protocol using three-party password-authenticated key exchange

被引:3
|
作者
Chang, Chin-Chen [1 ]
Wu, Yu-Ching [1 ]
Chang, Shih-Chang [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
来源
SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS | 2008年
关键词
D O I
10.1109/SecTech.2008.34
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet, e-mail authentication becomes more and more important. However, many existing e-mail authentication protocols are not secure enough. In 2005, Sun et al. proposed two e-mail protocols and claimed that can provide perfect forward secrecy. In 2007,Raphael showed the weaknesses of the two e-mail protocols. The first protocol can't securely against unknown key-share attack and the second protocol can't provide the perfect forward secrecy. It was contradictory to Sun et al.'s claimed. Therefore in this paper, we propose a novel e-mail protocol using three party password-authenticated key exchange to conquer the weaknesses of Sun et al. 's protocols.
引用
收藏
页码:150 / 154
页数:5
相关论文
共 50 条
  • [31] Parallelizable password-authenticated key exchange protocol
    Lee, SW
    Yoo, KY
    PARALLEL PROCESSING AND APPLIED MATHEMATICS, 2004, 3019 : 1014 - 1019
  • [32] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL
    Lo, Nai Wei
    Yeh, Kuo-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
  • [33] Cryptanalysis of a three-party password- based authenticated key exchange protocol using Weil pairing
    He, Debiao
    Chen, Jianhua
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 244 - 251
  • [34] An novel three-party authenticated key exchange protocol using one-time key
    Lv, Chao
    Ma, Maode
    Li, Hui
    Ma, Jianfeng
    Zhang, Yaoyu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 498 - 503
  • [35] Chaotic maps-based three-party password-authenticated key agreement scheme
    Xie, Qi
    Zhao, Jianmin
    Yu, Xiuyuan
    NONLINEAR DYNAMICS, 2013, 74 (04) : 1021 - 1027
  • [36] Password-based authenticated key exchange in the three-party setting
    Abdalla, M.
    Fouque, P.-A.
    Pointcheval, D.
    IEE Proceedings: Information Security, 2006, 153 (01): : 27 - 39
  • [37] Password Authenticated Key Exchange Based on RSA in the Three-Party Settings
    Dongna, E.
    Cheng, Qingfeng
    Ma, Chuangui
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 168 - 182
  • [38] Password-based authenticated key exchange in the three-party setting
    Abdalla, M
    Fouque, PA
    Pointcheval, D
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 65 - 84
  • [39] Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting
    Wu, Shuhua
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (03) : 1059 - 1072
  • [40] Chaotic maps-based three-party password-authenticated key agreement scheme
    Qi Xie
    Jianmin Zhao
    Xiuyuan Yu
    Nonlinear Dynamics, 2013, 74 : 1021 - 1027