Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 1/2013

01.03.2013

Secure verifier-based three-party password-authenticated key exchange

verfasst von: Qiong Pu, Jian Wang, Shuhua Wu, Ji Fu

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 1/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In order to secure large-scale peer-to-peer communication system, Chien recently presented a three-party password authenticated key exchange protocol using verifiers to reduce the damages of server corruption. In this paper, we first show his protocol is still vulnerable to a partition attack (offline dictionary attack). Thereafter we propose an enhanced verifier-based protocol that can defeat the attacks described and yet is reasonably efficient. Furthermore, we can provide the rigorous proof of the security for it.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bellovin S, Merritt M (1992) Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proc of IEEE symposium on security and privacyz. IEEE Computer Society Press, pp 72–84 Bellovin S, Merritt M (1992) Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proc of IEEE symposium on security and privacyz. IEEE Computer Society Press, pp 72–84
2.
Zurück zum Zitat Kobara K, Imai H (2002) Pretty-simple password-authenticated key-exchange under standard assumptions. Trans IEICE E85-A(10):2229–2237 Kobara K, Imai H (2002) Pretty-simple password-authenticated key-exchange under standard assumptions. Trans IEICE E85-A(10):2229–2237
3.
Zurück zum Zitat Bresson E, Chevassut O, Pointcheval D (2004) New security results on encrypted key exchange. In: Proc PKC 2004, LNCS 2947, pp 145–158 Bresson E, Chevassut O, Pointcheval D (2004) New security results on encrypted key exchange. In: Proc PKC 2004, LNCS 2947, pp 145–158
4.
Zurück zum Zitat Boyd C, Montague P, Nguyen K (2001) Elliptic curve based password authenticated key exchange protocols. In: Proc of 28th Australasian Conference on Information Security and Privacy—ACISP 2001, LNCS 2119, pp 487–501 Boyd C, Montague P, Nguyen K (2001) Elliptic curve based password authenticated key exchange protocols. In: Proc of 28th Australasian Conference on Information Security and Privacy—ACISP 2001, LNCS 2119, pp 487–501
5.
Zurück zum Zitat Abdalla M, Pointcheval D (2005) Simple password-based encrypted key exchange protocols. In: Proc of topics in cryptology—CT-RSA 2005, LNCS 3376, pp 191–208 Abdalla M, Pointcheval D (2005) Simple password-based encrypted key exchange protocols. In: Proc of topics in cryptology—CT-RSA 2005, LNCS 3376, pp 191–208
6.
Zurück zum Zitat Abdalla M, Chevassut O, Pointcheval D (2005) One-time verifier-based encrypted key exchange. In: Proc of PKC ’05, LNCS 3386, pp 47–64 Abdalla M, Chevassut O, Pointcheval D (2005) One-time verifier-based encrypted key exchange. In: Proc of PKC ’05, LNCS 3386, pp 47–64
7.
Zurück zum Zitat Lee S, Kim H, Yoo K (2005) Efficient verifier-based key agreement for three parties without server’s public key. Appl Math Comput 167(2):96–1003MathSciNetCrossRef Lee S, Kim H, Yoo K (2005) Efficient verifier-based key agreement for three parties without server’s public key. Appl Math Comput 167(2):96–1003MathSciNetCrossRef
8.
Zurück zum Zitat Lin C, Sun H, Steiner M, Hwang T (2001) Three-party encrypted key exchange without server’s public keys. IEEE Commun Lett 5(12):497–499CrossRef Lin C, Sun H, Steiner M, Hwang T (2001) Three-party encrypted key exchange without server’s public keys. IEEE Commun Lett 5(12):497–499CrossRef
9.
Zurück zum Zitat Lee T, Hwang T, Lin C (2004) Enhanced three-party encrypted key exchange without server’s public keys. Comput Secur 23(7):571–577CrossRef Lee T, Hwang T, Lin C (2004) Enhanced three-party encrypted key exchange without server’s public keys. Comput Secur 23(7):571–577CrossRef
10.
Zurück zum Zitat Lu R, Cao Z (2007) Simple three-party key exchange protocol. Comput Secur 26:94–97CrossRef Lu R, Cao Z (2007) Simple three-party key exchange protocol. Comput Secur 26:94–97CrossRef
11.
Zurück zum Zitat Abdalla M, Fouque P, Pointcheval D (2006) Password-based authenticated key exchange in the three-party setting. In: Proc of PKC’2005, LNCS 3386, pp 65–84 (Full version appeared in IEE Information Security 153(1):27–39) Abdalla M, Fouque P, Pointcheval D (2006) Password-based authenticated key exchange in the three-party setting. In: Proc of PKC’2005, LNCS 3386, pp 65–84 (Full version appeared in IEE Information Security 153(1):27–39)
12.
Zurück zum Zitat Abdalla M, Pointcheval D (2005) Interactive Diffie–Hellman assumptions with applications to password-based authentication. In: Proc of FC’2005, LNCS 3570, pp 341–356 Abdalla M, Pointcheval D (2005) Interactive Diffie–Hellman assumptions with applications to password-based authentication. In: Proc of FC’2005, LNCS 3570, pp 341–356
13.
Zurück zum Zitat Kwon J, Jeong I, Sakurai K, Lee D (2007) Efficient verifierbased password-authenticated key exchange in the three-party setting. Comp Stand Inter 29:513–520CrossRef Kwon J, Jeong I, Sakurai K, Lee D (2007) Efficient verifierbased password-authenticated key exchange in the three-party setting. Comp Stand Inter 29:513–520CrossRef
14.
Zurück zum Zitat Huang H (2009) A simple three-party password-based key exchange protocol. Int J Commun Syst 22(7):857–862CrossRef Huang H (2009) A simple three-party password-based key exchange protocol. Int J Commun Syst 22(7):857–862CrossRef
16.
Zurück zum Zitat Chien H, Wu T (2009) Provably secure password-based three-party key exchange with optimal message steps. Comput J 52(6):646–655CrossRef Chien H, Wu T (2009) Provably secure password-based three-party key exchange with optimal message steps. Comput J 52(6):646–655CrossRef
17.
Zurück zum Zitat Lee T, Hwang T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inform Sci 180(9):1702–1714MATHCrossRef Lee T, Hwang T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inform Sci 180(9):1702–1714MATHCrossRef
18.
Zurück zum Zitat Chien H (2011) Secure verifier-based three-party key exchange in the random oracle model. J Inf Sci Eng 27(4):1487–1501MathSciNetMATH Chien H (2011) Secure verifier-based three-party key exchange in the random oracle model. J Inf Sci Eng 27(4):1487–1501MathSciNetMATH
19.
Zurück zum Zitat Yoon E, Yoo K (2011) Cryptanalysis of a simple three-party password-based key exchange protocol. Int J Commun Syst 24(4):532–542CrossRef Yoon E, Yoo K (2011) Cryptanalysis of a simple three-party password-based key exchange protocol. Int J Commun Syst 24(4):532–542CrossRef
20.
Zurück zum Zitat Choo K, Boyd C, Hitchcock Y (2005) Examining indistinguishability-based proof models for key establishment protocols. In: Proc of ASIACRYPT’2005, LNCS 3788, pp 585–604 Choo K, Boyd C, Hitchcock Y (2005) Examining indistinguishability-based proof models for key establishment protocols. In: Proc of ASIACRYPT’2005, LNCS 3788, pp 585–604
21.
Zurück zum Zitat Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: Proc of EUROCRYPT’2000, LNCS 1807, pp 139–155 Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: Proc of EUROCRYPT’2000, LNCS 1807, pp 139–155
22.
Zurück zum Zitat Abdalla M, Bresson E, Chevassut O, Möller B, Pointcheval D (2006) Provably secure password-based authentication in TLS. In: Proc of AsiaCCS’06. ACM, pp 35–45 Abdalla M, Bresson E, Chevassut O, Möller B, Pointcheval D (2006) Provably secure password-based authentication in TLS. In: Proc of AsiaCCS’06. ACM, pp 35–45
Metadaten
Titel
Secure verifier-based three-party password-authenticated key exchange
verfasst von
Qiong Pu
Jian Wang
Shuhua Wu
Ji Fu
Publikationsdatum
01.03.2013
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 1/2013
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-012-0125-y

Weitere Artikel der Ausgabe 1/2013

Peer-to-Peer Networking and Applications 1/2013 Zur Ausgabe