An Efficient Password-Only Authenticated Three-Party Key Exchange Protocol
نویسندگان
چکیده
Password-only authenticated key exchange (PAKE) protocols allow to generate cryptographically strong keys from humanmemorable passwords. The design of an efficient PAKE protocol is difficult, especially in the three-party setting where dictionary attacks by malicious insiders are a major concern. The difficulty is well illustrated by the fact that after twenty years of research, only a handful of three-party PAKE protocols are known to be provably secure in a model that captures insider attacks. This paper proposes a new, efficient three-party PAKE protocol which incorporates the design principle of Bresson et al.’s two-party PAKE protocol called OMDHKE. A cost comparison in terms of communication and computation complexities shows that the overall performance of our protocol is superior to those of previously published three-party PAKE protocols. Moreover, our protocol has an advantage over its competitors in that it can be easily transformed into a simpler and more efficient protocol in an environment where undetectable online dictionary attacks do not pose a significant threat. We provide a proof of security for the protocol in the widely accepted model of Bellare et al. which captures insider attack. Keyword: Cryptography, Authenticated key exchange, Dictionary attack, Three-party setting
منابع مشابه
Enhancements of a three-party password-based authenticated key exchange protocol
This paper discusses the security for a simple and efficient three-party password-based authenticated key exchange protocol proposed by Huang most recently. Our analysis shows her protocol is still vulnerable to three kinds of attacks: 1). undetectable on-line dictionary attacks, 2). key-compromise impersonation attack. Thereafter we propose an enhanced protocol that can defeat the attacks desc...
متن کاملTwo-Round Password-Only Authenticated Key Exchange in the Three-Party Setting
We present the first provably-secure three-party password-only authenticated key exchange (PAKE) protocol that can run in only two communication rounds. Our protocol is generic in the sense that it can be constructed from any two-party PAKE protocol. The protocol is proven secure in a variant of the widely-accepted model of Bellare, Pointcheval and Rogaway (2000) without any idealized assumptio...
متن کاملWeakness of a three-party password-based authenticated key exchange protocol
To guarantee the quality of the growing popular communication services, quite recently, Huang presented a simple and efficient three-party password-based authenticated key exchange protocol in International Journal of Communications and Systems. In this letter, we first show her protocol is still vulnerable to a partition attack (offline dictionary attack), by which the adversary can easily det...
متن کاملInteractive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
The area of password-based authenticated key exchange protocols has been the subject of a vast amount of work in the last few years due to its practical aspects. In these protocols, the goal is to enable users communicating over an unreliable channel to establish a secure session key even when the secret key that they share is drawn from a small set of values. Despite the attention given to it,...
متن کاملPassword-Based Authenticated Key Exchange in the Three-Party Setting
Password-based authenticated key exchange are protocols which are designed to be secure even when the secret key or password shared between two users is drawn from a small set of values. Due to the low entropy of passwords, such protocols are always subject to online guessing attacks. In these attacks, the adversary may succeed with non-negligible probability by guessing the password shared bet...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017