A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password

被引:3
|
作者
Zhang Gefei [1 ,2 ]
Fan Dan [1 ,3 ]
Zhang Yuqing [1 ]
Li Xiaowei [1 ]
机构
[1] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing 100049, Peoples R China
[2] Chinese Acad Cyberspace Studies, Beijing 100010, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
General construction; Provable secure; Smart card; Password; Key exchange protocol; AUTHENTICATION; SCHEME; DESIGN; ROBUST;
D O I
10.1049/cje.2016.06.017
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a password. Most of these protocols are often limited to simple network systems, and they may have security risks. We propose a general construction for key exchange protocols using smart card and password to avoid these flaws. The constructed protocol from the general construction has only one additional communication round than the original public encryption scheme. This construction is proven secure under random oracle model, so it can resist several common types of attacks. It is also adapted well to various networks. Compared with related protocols, the proposed key exchange protocol generated from the general construction has better secure properties and good computational efficiency in storage cost and operation time.
引用
收藏
页码:271 / 278
页数:8
相关论文
共 50 条
  • [1] A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password
    ZHANG Gefei
    FAN Dan
    ZHANG Yuqing
    LI Xiaowei
    ChineseJournalofElectronics, 2017, 26 (02) : 271 - 278
  • [2] Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
    Wang, Weijia
    Hu, Lei
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 118 - +
  • [3] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001
  • [4] A provably secure smart card-based authenticated group key exchange protocol
    Chang, Chin-Chen
    Le, Hai-Duong
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1602 - 1607
  • [5] Provably secure password-authenticated key exchange using Diffie-Hellman
    Boyko, V
    MacKenzie, P
    Patel, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 156 - 171
  • [6] On session key construction in provably-secure key establishment protocols
    Choo, KKR
    Boyd, C
    Hitchcock, Y
    PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 116 - 131
  • [7] Password-based Authenticated Key Exchange Scheme Using Smart Card
    Liu Hui
    Zhong Shaojun
    FIFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2012): COMPUTER VISION, IMAGE ANALYSIS AND PROCESSING, 2013, 8783
  • [8] Provably secure authenticated Diffie-Hellman key exchange for resource-limited smart card
    Chien H.-Y.
    Chien, H.-Y. (hychien@ncnu.edu.tw), 1600, Shanghai Jiaotong University (19): : 436 - 439
  • [9] Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card
    简宏宇
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 436 - 439
  • [10] Provably secure threshold password-authenticated key exchange extended abstract
    Di Raimondo, M
    Gennaro, R
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 507 - 523