期刊文献+

A Two-Party Password-Authenticated Key Exchange Protocol with Verifier

A Two-Party Password-Authenticated Key Exchange Protocol with Verifier
下载PDF
导出
摘要 To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user stores his password in plaintext, and the server stores a verifier for the user’s password, using DL difficult problem and DH difficult problem, through the session between user and server to establish a session key. The security discussion result shows that the proposed protocol provides forward secrecy, and can effectively defend against server compromising fake attacks, dictionary attacks and middleman attacks. Protocol efficiency comparisons reveal our protocol is more reasonable. To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user stores his password in plaintext, and the server stores a verifier for the user’s password, using DL difficult problem and DH difficult problem, through the session between user and server to establish a session key. The security discussion result shows that the proposed protocol provides forward secrecy, and can effectively defend against server compromising fake attacks, dictionary attacks and middleman attacks. Protocol efficiency comparisons reveal our protocol is more reasonable.
作者 Shunbo Xiang Bing Xu Ke Chen Shunbo Xiang;Bing Xu;Ke Chen(School of Computer, Guangdong University of Petrochemical Technology, Maoming, China)
机构地区 School of Computer
出处 《Journal of Computer and Communications》 2021年第4期102-109,共8页 电脑和通信(英文)
关键词 VERIFIER Password-Authenticated Key Exchange Fake Attack Dictionary Attack Session Key Verifier Password-Authenticated Key Exchange Fake Attack Dictionary Attack Session Key
  • 相关文献

参考文献3

二级参考文献34

  • 1殷胤,李宝.标准模型下可证安全的加密密钥协商协议[J].软件学报,2007,18(2):422-429. 被引量:9
  • 2FENG DengGuo CHEN WeiDong.Modular approach to the design and analysis of password-based security protocols[J].Science in China(Series F),2007,50(3):381-398. 被引量:4
  • 3Bellovin S and Merritt M. Encrypted key exchange: password-based protocol secure against dictionary attacks[C]. Proceedings of the 1992 Conference IEEE computer society symp. on Research in security and privacy, Oakland, USA, 1992: 72-84.
  • 4Bellare M, Pointcheval D, and Rogaway P. Authenticated key exchange secure against dictionary attacks[C]. Proceedings of EUROCRYPT 2000, Bruges, Belgium, LNCS 1807: 139-155.
  • 5Abdalla M, Chevassut O, and Pointcheval D. One-time verifier-based encrypted key exchange[C]. Proceedings of PKC 2005, Les Diablerets, Switzerland, LNCS 3386: 47-64.
  • 6Abdalla M and Pointcheval D, Simple password-based encrypted key exchange protocols[C]. Proceedings of CT-RSA 2005, San Francisco, USA, LNCS 3376: 191-208.
  • 7Shao Jun, Cao Zhen fu, and Wang Li cheng. Efficient password-based authenticated key exchange without Public information[C]. Proceedings of ESORICS 2007, Dresden, Germany, LNCS 4734: 299-310.
  • 8Katz J, Ostrovsky R, and Yung M. Efficient password-authentication key exchange using human- memorable passwords[C]. Proceedings of EUROCRYPT 2001 Innsbruck, Austria, LNCS 2045: 475-494.
  • 9Jiang S Q and Gong G. Password based key exchange with mutual authentication[C]. Proceedings of SAC 2004, Nicosia, Cyprus, LNCS 3357: 267-279.
  • 10Boyd C,Mathuria A.Protocols for authentication and key establishment[M].Berlin : Springer-Verlag, 2003 : 247-266.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部