Skip to main content
Erschienen in: Wireless Personal Communications 2/2016

01.05.2016

An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client–Client Networks

verfasst von: Mohammad Heydari, S. Mohammad Sajad Sadough, Mohammad Sabzinejad Farash, Shehzad Ashraf Chaudhry, Khalid Mahmood

Erschienen in: Wireless Personal Communications | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Three party password based authenticated key exchange protocol can sanction couple of clients to institute a protected session key through a server above an insecure communication link. Youn et al. (Telecommun Syst 52(2):1367–1376, 2013) proposed three-party efficient and robust authenticated key exchange scheme that incurs three rounds. They assert that their scheme is invincible against customary attacks. Moreover, they claimed the scheme is lightweight due to low communication, computation costs and incorporating authentication in three rounds. However, comprehensive analysis in this paper reveals that Youn et al.’s scheme is susceptible to impersonation attack. To overcome the security feebleness, this paper introduces a modest scheme which not only maintains round efficiency, communication and computation costs but it also offer comprehensive security to repel popular security attacks. The security of the proposed scheme is verified through random oracle model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Farash, M. S., Bayat, M., & Attari, M. A. (2011). Vulnerability of two multiple-key agreement protocols. Computers & Electrical Engineering, 37(2), 199–204.MATHCrossRef Farash, M. S., Bayat, M., & Attari, M. A. (2011). Vulnerability of two multiple-key agreement protocols. Computers & Electrical Engineering, 37(2), 199–204.MATHCrossRef
2.
Zurück zum Zitat Farash, M. S., Attari, M. A., & Bayat, M. (2012). A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings. IACSIT International Journal of Engineering and Technology, 4(3), 321–325.CrossRef Farash, M. S., Attari, M. A., & Bayat, M. (2012). A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings. IACSIT International Journal of Engineering and Technology, 4(3), 321–325.CrossRef
3.
Zurück zum Zitat Farash, M. S., Attari, M. A., Atani, R. E., & Jami, M. (2013). A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Computers & Electrical Engineering, 39(2), 530–541.CrossRef Farash, M. S., Attari, M. A., Atani, R. E., & Jami, M. (2013). A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Computers & Electrical Engineering, 39(2), 530–541.CrossRef
4.
Zurück zum Zitat Farash, M. S., & Attari, M. A. (2013). Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. The ISC International Journal of Information Security, 5(1), 1–15. Farash, M. S., & Attari, M. A. (2013). Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. The ISC International Journal of Information Security, 5(1), 1–15.
5.
Zurück zum Zitat Farash, M. S., & Attari, M. A. (2014). A pairing-free ID-based key agreement protocol with different PKGs. International Journal of Network Security, 16(2), 143–148.MathSciNet Farash, M. S., & Attari, M. A. (2014). A pairing-free ID-based key agreement protocol with different PKGs. International Journal of Network Security, 16(2), 143–148.MathSciNet
6.
Zurück zum Zitat Chen, B. L., Kuo, W. C., & Wuu, L. C. (2012). A secure password-based remote user authentication scheme without smart cards. Information Technology and Control, 41(1), 53–59.CrossRef Chen, B. L., Kuo, W. C., & Wuu, L. C. (2012). A secure password-based remote user authentication scheme without smart cards. Information Technology and Control, 41(1), 53–59.CrossRef
7.
Zurück zum Zitat Jiang, Q., Ma, J., Li, G., & Ma, Z. (2013). An improved password-based remote user authentication protocol without smart cards. Information Technology and Control, 42(2), 150–158.CrossRef Jiang, Q., Ma, J., Li, G., & Ma, Z. (2013). An improved password-based remote user authentication protocol without smart cards. Information Technology and Control, 42(2), 150–158.CrossRef
8.
Zurück zum Zitat Bayat, M., Farash, M. S., & Movahed, A. (2010). A Novel Secure bilinear pairing based remote user authentication scheme with smart card. In IEEE/IFIP international conference on embedded and ubiquitous computing (EUC) (pp. 578–582). Bayat, M., Farash, M. S., & Movahed, A. (2010). A Novel Secure bilinear pairing based remote user authentication scheme with smart card. In IEEE/IFIP international conference on embedded and ubiquitous computing (EUC) (pp. 578–582).
9.
Zurück zum Zitat Farash, M. S., & Attari, M. A. (2013). An enhanced authenticated key agreement for session initiation protocol. Information Technology and Control, 42(4), 333–342.CrossRef Farash, M. S., & Attari, M. A. (2013). An enhanced authenticated key agreement for session initiation protocol. Information Technology and Control, 42(4), 333–342.CrossRef
11.
Zurück zum Zitat Xie, Q., Dong, N., Tan, X., Wong, D. S., & Wang, G. (2013). Improvement of a three-party password-based key exchange protocol with formal verification. Information Technology and Control, 42(3), 231–237.CrossRef Xie, Q., Dong, N., Tan, X., Wong, D. S., & Wang, G. (2013). Improvement of a three-party password-based key exchange protocol with formal verification. Information Technology and Control, 42(3), 231–237.CrossRef
12.
Zurück zum Zitat Liu, T., Pu, Q., Zhao, Y., & Wu, S. (2013). ECC-based password-authenticated key exchange in the three-party setting. Arabian Journal for Science and Engineering, 38(8), 2069–2077.MathSciNetCrossRef Liu, T., Pu, Q., Zhao, Y., & Wu, S. (2013). ECC-based password-authenticated key exchange in the three-party setting. Arabian Journal for Science and Engineering, 38(8), 2069–2077.MathSciNetCrossRef
13.
Zurück zum Zitat Chien, H. Y., & Wu, T. C. (2009). Provably secure password-based three-party key exchange with optimal message steps. Computer Journal, 52(6), 646–655.CrossRef Chien, H. Y., & Wu, T. C. (2009). Provably secure password-based three-party key exchange with optimal message steps. Computer Journal, 52(6), 646–655.CrossRef
14.
Zurück zum Zitat Lee, T. F., Liu, J. L., Sung, M. J., Yang, S. B., & Chen, C. M. (2009). Communication-efficient three-party protocols for authentication and key agreement. Computers & Mathematics with Applications, 58(4), 641–648.MathSciNetMATHCrossRef Lee, T. F., Liu, J. L., Sung, M. J., Yang, S. B., & Chen, C. M. (2009). Communication-efficient three-party protocols for authentication and key agreement. Computers & Mathematics with Applications, 58(4), 641–648.MathSciNetMATHCrossRef
15.
Zurück zum Zitat Xiong, H., Chen, Y., Guan, Z., & Chen, Z. (2013). Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Information Sciences, 235(1), 329–340.MathSciNetMATHCrossRef Xiong, H., Chen, Y., Guan, Z., & Chen, Z. (2013). Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Information Sciences, 235(1), 329–340.MathSciNetMATHCrossRef
16.
Zurück zum Zitat Chen, H. B., Chen, T. H., Lee, W. B., & Chang, C. C. (2008). Security enhancement for a three-party encrypted key exchange protocol against undectectable on-line password guessing attacks. Computer Standards & Interfaces, 30(1–2), 95–99.CrossRef Chen, H. B., Chen, T. H., Lee, W. B., & Chang, C. C. (2008). Security enhancement for a three-party encrypted key exchange protocol against undectectable on-line password guessing attacks. Computer Standards & Interfaces, 30(1–2), 95–99.CrossRef
17.
Zurück zum Zitat Zhao, J., & Gu, D. (2012). Provably secure three-party password-based authenticated key. Information Sciences, 184(1), 310–323.MathSciNetMATHCrossRef Zhao, J., & Gu, D. (2012). Provably secure three-party password-based authenticated key. Information Sciences, 184(1), 310–323.MathSciNetMATHCrossRef
18.
Zurück zum Zitat Yang, J. H., & Cao, T. J. (2012). Provably secure three-party password authenticated key exchange protocol in the standard model. Journal of Systems and Software, 85(2), 340–350.CrossRef Yang, J. H., & Cao, T. J. (2012). Provably secure three-party password authenticated key exchange protocol in the standard model. Journal of Systems and Software, 85(2), 340–350.CrossRef
19.
Zurück zum Zitat Kim, H. S., & Choi, J. Y. (2009). Enhanced password-based simple three-party key exchange protocol. Computers & Electrical Engineering, 35(1), 107–114.MATHCrossRef Kim, H. S., & Choi, J. Y. (2009). Enhanced password-based simple three-party key exchange protocol. Computers & Electrical Engineering, 35(1), 107–114.MATHCrossRef
20.
Zurück zum Zitat Nam, J., Paik, J., Kang, H. K., Kim, U. M., & Won, D. (2009). An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Communications Letters, 13(3), 205–207.CrossRef Nam, J., Paik, J., Kang, H. K., Kim, U. M., & Won, D. (2009). An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Communications Letters, 13(3), 205–207.CrossRef
21.
Zurück zum Zitat Nam, J., Paik, J., & Won, D. (2011). A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol. Information Sciences, 181(1), 234–238.MathSciNetMATHCrossRef Nam, J., Paik, J., & Won, D. (2011). A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol. Information Sciences, 181(1), 234–238.MathSciNetMATHCrossRef
22.
Zurück zum Zitat Lou, D. C., & Huang, H. F. (2010). Efficient three-party password-based key exchange scheme. International Journal of Communication Systems, 24(4), 504–512.CrossRef Lou, D. C., & Huang, H. F. (2010). Efficient three-party password-based key exchange scheme. International Journal of Communication Systems, 24(4), 504–512.CrossRef
23.
Zurück zum Zitat Huang, H. F. (2009). A simple three-party password-based key exchange protocol. International Journal of Communication Systems, 22(7), 857–862.CrossRef Huang, H. F. (2009). A simple three-party password-based key exchange protocol. International Journal of Communication Systems, 22(7), 857–862.CrossRef
24.
Zurück zum Zitat Yoon, E. J., & Yoo, K. Y. (2011). Cryptanalysis of a simple three-party password-based key exchange protocol. International Journal of Communication Systems, 24(4), 532–542.CrossRef Yoon, E. J., & Yoo, K. Y. (2011). Cryptanalysis of a simple three-party password-based key exchange protocol. International Journal of Communication Systems, 24(4), 532–542.CrossRef
25.
Zurück zum Zitat Wu, S., Chen, K., & Zhu, Y. (2013). Enhancements of a three-party password-based authenticated key exchange protocol. International Arab Journal of Information Technology, 10(3), 215. Wu, S., Chen, K., & Zhu, Y. (2013). Enhancements of a three-party password-based authenticated key exchange protocol. International Arab Journal of Information Technology, 10(3), 215.
26.
Zurück zum Zitat Lee, T. F., & Hwang, T. (2010). Simple password-based three-party authenticated key exchange without server public keys. Information Sciences, 180(9), 1702–1714.MATHCrossRef Lee, T. F., & Hwang, T. (2010). Simple password-based three-party authenticated key exchange without server public keys. Information Sciences, 180(9), 1702–1714.MATHCrossRef
27.
Zurück zum Zitat Chang, T. Y., Hwang, M. S., & Yang, W. P. (2011). A communication-efficient three-party password authenticated key exchange protocol. Information Sciences, 181(1), 217–226.MathSciNetCrossRef Chang, T. Y., Hwang, M. S., & Yang, W. P. (2011). A communication-efficient three-party password authenticated key exchange protocol. Information Sciences, 181(1), 217–226.MathSciNetCrossRef
28.
Zurück zum Zitat Wu, S., Pu, Q., Wang, S., & He, D. (2012). Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol. Information Sciences, 215(1), 83–96.MathSciNetMATHCrossRef Wu, S., Pu, Q., Wang, S., & He, D. (2012). Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol. Information Sciences, 215(1), 83–96.MathSciNetMATHCrossRef
29.
Zurück zum Zitat Tso, R. (2013). Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol. The Journal of Supercomputing. doi:10.1007/s11227-013-0917-8. Tso, R. (2013). Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol. The Journal of Supercomputing. doi:10.​1007/​s11227-013-0917-8.
30.
Zurück zum Zitat Chien, H. (2011). Secure verifier-based three-party key exchange in the random oracle model. Journal of Information Science and Engineering, 27(4), 1487–1501.MathSciNetMATH Chien, H. (2011). Secure verifier-based three-party key exchange in the random oracle model. Journal of Information Science and Engineering, 27(4), 1487–1501.MathSciNetMATH
31.
Zurück zum Zitat Pu, Q., Wang, J., Wu, S., & Fu, J. (2013). Secure verifier-based three-party password-authenticated key exchange. Peer-to-Peer Networking and Applications, 6(1), 15–25.CrossRef Pu, Q., Wang, J., Wu, S., & Fu, J. (2013). Secure verifier-based three-party password-authenticated key exchange. Peer-to-Peer Networking and Applications, 6(1), 15–25.CrossRef
32.
Zurück zum Zitat Tallapally, S. (2012). Security enhancement on simple three-party PAKE protocol. Information Technology and Control, 41(1), 15–22.CrossRef Tallapally, S. (2012). Security enhancement on simple three-party PAKE protocol. Information Technology and Control, 41(1), 15–22.CrossRef
33.
34.
Zurück zum Zitat Youn, T. Y., Kang, E. S., & Lee, C. (2013). Efficient three-party key exchange protocols with round efficiency. Telecommunication Systems, 52(2), 1367–1376. Youn, T. Y., Kang, E. S., & Lee, C. (2013). Efficient three-party key exchange protocols with round efficiency. Telecommunication Systems, 52(2), 1367–1376.
35.
Zurück zum Zitat Abdalla, M., & Pointcheval, D. (2005). Interactive Diffie–Hellman assumptions with applications to password-based authentication. In Proceedings of FC’05, LNCS 3570 (pp. 341–356). Abdalla, M., & Pointcheval, D. (2005). Interactive Diffie–Hellman assumptions with applications to password-based authentication. In Proceedings of FC’05, LNCS 3570 (pp. 341–356).
Metadaten
Titel
An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client–Client Networks
verfasst von
Mohammad Heydari
S. Mohammad Sajad Sadough
Mohammad Sabzinejad Farash
Shehzad Ashraf Chaudhry
Khalid Mahmood
Publikationsdatum
01.05.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3123-6

Weitere Artikel der Ausgabe 2/2016

Wireless Personal Communications 2/2016 Zur Ausgabe

Neuer Inhalt