Provably secure three-party password-based authenticated key exchange protocol

被引:33
|
作者
Zhao, Jianjie [1 ]
Gu, Dawu [2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Authenticated key agreement; Trapdoor test; CDH assumption; AGREEMENT PROTOCOL; EFFICIENT;
D O I
10.1016/j.ins.2011.07.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A three-party password-based authenticated key exchange (3PAKE) protocol is a useful mechanism to establish a secure session key in a network. However, most current 3PAKE protocols only achieve "heuristic" security; the underlying hardness assumptions of these protocols are not perfect. We propose a 3PAKE protocol which is provably secure if the Diffie-Hellman problem is computationally infeasible (the CDH assumption), even in the 3eCK model where the adversary is allowed to make more queries and have more freedom than previous models. In our formal proof, we use the trapdoor test technique introduced by Cash, Kiltz and Shoup to construct an efficient decision oracle. As far as we know, our protocol is the first provably secure 3PAKE protocol based on the CDH assumption and the first 3PAKE protocol using the trapdoor test technique for the security proof. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:310 / 323
页数:14
相关论文
共 50 条
  • [31] Cryptanalysis of a simple three-party password-based key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) : 532 - 542
  • [32] Hybrid Protocol for Password-based Key Exchange in Three-party Setting
    He Xinzheng
    Ru Bei
    Fei Jinlong
    Xun Baocheng
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 119 - +
  • [33] Enhanced password-based simple three-party key exchange protocol
    Kim, Hyun-Seok
    Choi, Jin-Young
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 107 - 114
  • [34] Simple three-party password authenticated key exchange protocol
    Lo N.-W.
    Yeh K.-H.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 600 - 603
  • [35] Simple Three-Party Password Authenticated Key Exchange Protocol
    罗乃维
    叶国晖
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (05) : 600 - 603
  • [36] An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks
    Hang Tu
    Neeraj Kumar
    Debiao He
    Jongsung Kim
    Changhoon Lee
    The Journal of Supercomputing, 2014, 70 : 224 - 235
  • [37] An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks
    Tu, Hang
    Kumar, Neeraj
    He, Debiao
    Kim, Jongsung
    Lee, Changhoon
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (01): : 224 - 235
  • [38] A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
    Chun-Ta Li
    Chin-Ling Chen
    Cheng-Chi Lee
    Chi-Yao Weng
    Chien-Ming Chen
    Soft Computing, 2018, 22 : 2495 - 2506
  • [39] A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Chen, Chien-Ming
    SOFT COMPUTING, 2018, 22 (08) : 2495 - 2506
  • [40] Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
    Sahi, Agee
    Lai, David
    Li, Yan
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2018, 21 (04) : 560 - 581