Provably secure three-party password-based authenticated key exchange protocol

被引:33
|
作者
Zhao, Jianjie [1 ]
Gu, Dawu [2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Authenticated key agreement; Trapdoor test; CDH assumption; AGREEMENT PROTOCOL; EFFICIENT;
D O I
10.1016/j.ins.2011.07.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A three-party password-based authenticated key exchange (3PAKE) protocol is a useful mechanism to establish a secure session key in a network. However, most current 3PAKE protocols only achieve "heuristic" security; the underlying hardness assumptions of these protocols are not perfect. We propose a 3PAKE protocol which is provably secure if the Diffie-Hellman problem is computationally infeasible (the CDH assumption), even in the 3eCK model where the adversary is allowed to make more queries and have more freedom than previous models. In our formal proof, we use the trapdoor test technique introduced by Cash, Kiltz and Shoup to construct an efficient decision oracle. As far as we know, our protocol is the first provably secure 3PAKE protocol based on the CDH assumption and the first 3PAKE protocol using the trapdoor test technique for the security proof. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:310 / 323
页数:14
相关论文
共 50 条
  • [21] Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings
    Wei, Fushan
    Ma, Chuangui
    Cheng, Qingfeng
    INFORMATION COMPUTING AND APPLICATIONS, 2010, 6377 : 135 - 142
  • [22] Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol
    Wang, Qingping
    Ruan, Ou
    Wang, Zihao
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 497 - 508
  • [23] Re-attack on a three-party password-based authenticated key exchange protocol
    Liang, Haiquan
    Hu, Jingtai
    Wu, Shuhua
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (5-6) : 1175 - 1183
  • [24] Security analysis and enhancement for three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    Zhang, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 273 - 278
  • [25] How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols
    Wang, Weijia
    Hu, Lei
    Li, Yong
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 218 - +
  • [26] A simple three-party password-based key exchange protocol
    Huang, Hui-Feng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2009, 22 (07) : 857 - 862
  • [27] On a simple three-party password-based key exchange protocol'
    Lin, Ching-Ying
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (11) : 1520 - 1532
  • [28] Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting
    Wu, Shuhua
    Zhu, Yuefei
    Network and Parallel Computing, 2008, 5245 : 105 - 115
  • [29] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chen, Chien-Ming
    Wang, King-Hang
    Yeh, Kuo-Hui
    Xiang, Bin
    Wu, Tsu-Yang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) : 3133 - 3142
  • [30] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chien-Ming Chen
    King-Hang Wang
    Kuo-Hui Yeh
    Bin Xiang
    Tsu-Yang Wu
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 3133 - 3142