Advanced Search
Volume 32 Issue 8
Sep.  2010
Turn off MathJax
Article Contents
Deng Miao-Lei, Wang Yu-Lei, Zhou Li-Hua. Universally Composable Three Party Password-authenticated Key Exchange Protocol[J]. Journal of Electronics & Information Technology, 2010, 32(8): 1948-1952. doi: 10.3724/SP.J.1146.2009.00824
Citation: Deng Miao-Lei, Wang Yu-Lei, Zhou Li-Hua. Universally Composable Three Party Password-authenticated Key Exchange Protocol[J]. Journal of Electronics & Information Technology, 2010, 32(8): 1948-1952. doi: 10.3724/SP.J.1146.2009.00824

Universally Composable Three Party Password-authenticated Key Exchange Protocol

doi: 10.3724/SP.J.1146.2009.00824 cstr: 32379.14.SP.J.1146.2009.00824
  • Received Date: 2009-06-03
  • Rev Recd Date: 2010-05-11
  • Publish Date: 2010-08-19
  • Many existing three Party Password-Authenticated Key Exchange (3PAKE) protocols are found insecure. An ideal functionality of 3PAKE is defined in the universal composability model,and a 3PAKE protocol is constructed to realize the 3PAKE ideal functionality in the hybrid model which aided by two party password-authenticated key exchange ideal functionality. The new protocol comprises of three phases: intermediate key generation, message authentication transmission and session key generation. The protocol is UC-secure, and has simpler structure.
  • loading
  • Lin C L, Sun H M, and Hwang T. Three party-encrypted keyexchange: attacks and a solution[J].ACM Operating SystemReview.2000, 34(4):12-20[2]Sun H M, Chen B, and Hwang T. Secure key agreementprotocols for three-party against guessing attacks[J].TheJournal of Systems and Software.2005, 75(2):63-68[3]Steiner M, Tsudik G, and Wainder M. Refinement andextension of encrypted key exchange[J].ACM OperationSystems Review.1995, 29(3):22-30[4]Lu R and Cao Z. Simple three-party key exchange protocol[J].Computer Security.2007, 26(1):94-97[5]Guo H, Li Z, and Mu Y, et al.. Cryptanalysis of simple threepartykey exchange protocol[J].Computers Security.2008,27(1):16-21[6]Phan R C, Yau W, and Goi B. Cryptanalysis of simplethree-party key exchange protocol[J].Information Sciences.2008, 178(13):2849-2856[7]Nam J, Paik J, and Kang H, et al.. An off-line dictionaryattack on a simple three-party key exchange protocol[J].IEEE Communications Letters.2009, 13(3):205-208[8]Huang H F. A simple three-party password-based keyexchange protocol[J]. International Journal ofCommunication Systems, 2009, 22(2): 113-119.[9]Canetti R. Universally composable security: a new paradigmfor cryptographic protocols[C]. IEEE Annual Symposium onFoundations of Computer Science, Nevada, USA, October2001: 136-145.[10]Ota H, Yoneyama K, and Kiyomoto S, et al.. Universallycomposable client-to-client general authenticated keyexchange[J]. Transactions of Information Processing Societyof Japan, 2007, 48(9): 3073-3088.[11]Abdalla M, Catalano D, and Chevalier C. Efficient two-partypassword-based key exchange protocols in the UCframework[C]. Cryptographers Track at the RSA Conference2008, San Francisco, USA, April 2008: 335-351.[12]邓淼磊, 王玉磊, 周利华. 通用可组合安全的公平电子支付协议[J].电子与信息学报.2009, 31(5):1063-1066浏览[13]Abdalla M, Fouque P, and Pointcheval D. Password-basedauthenticated key exchange in the three-party setting[J].IEEE Proceedings-Information Security.2006, 153(1):27-39
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (4093) PDF downloads(713) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return