Browse > Article
http://dx.doi.org/10.5909/JBE.2008.13.2.251

Verifier-Based Multi-Party Password-Authenticated Key Exchange for Secure Content Transmission  

Kwon, Jeong-Ok (Graduate School of Information Management & Security CIST, Korea University)
Jeong, Ik-Rae (Graduate School of Information Management & Security CIST, Korea University)
Choi, Jae-Tark (Graduate School of Information Management & Security CIST, Korea University)
Lee, Dong-Hoon (Graduate School of Information Management & Security CIST, Korea University)
Publication Information
Journal of Broadcast Engineering / v.13, no.2, 2008 , pp. 251-260 More about this Journal
Abstract
In this paper, we present two verifier-based multi-party PAKE (password-authenticated key exchange) protocols. The shared key can be used for secure content transmission. The suggested protocols are secure against server compromise attacks. Our first protocol is designed to provide forward secrecy and security against known-key attacks. The second protocol is designed to additionally provide key secrecy against the server which means that even the server can not know the session keys of the users of a group. The suggested protocols have a constant number of rounds are provably secure in the standard model. To the best of our knowledge, the proposed protocols are the first secure multi-party PAKE protocols against server compromise attacks in the literature.
Keywords
Verifier-based group password key exchange; dictionary attack; forward secrecy; known-key secrecy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Abdalla, E. Bresson, O. Chevassut, and D. Pointcheval. Password-based Group Key Exchange in a Constant Number of Rounds, In Proc. of PKC '06, LNCS 3958, pages 427-442 , 2006
2 J. W. Byun and D. H. Lee. Password-Authenticated Key Exchange between Clients with Different Passwords, In Proc. of ACNS '05, LNCS 3531, pages 75-90, 2005
3 M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System, In Proc. of EUROCRYPT '94, LNCS 950, pages 275-286, Springer-Verlag, 1995
4 S. M. Lee, J. Y. Hwang and D. H. Lee. Efficient Password-Based Group Key Exchange, In Proc. of TrustBus '04, LNCS 3184, pages 191-199, Springer-Verlag, 2004
5 Raphael C.-W. Phan and B.-M Goi. Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords, In Proc. of ACNS '06, LNCS 3989, pp. 226-238, Springer-Verlag, 2006
6 E. Bresson, O. Chevassut, and D. Pointcheval. Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks, In Proc. of ASIACRYPT 2002, LNCS 2501, pages 497-514, Springer-Verlag, 2002
7 J. O. Kwon, I. R. Jeong, D. H. Lee. One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange, In Proc. of CMS 2006, LNCS 4237, pages 87-96, Springer-Verlag, 2006
8 N. Asokan and P. Ginzboorg. Key Agreement in Ad-hoc Networks, Journal of Computer Communications 23(17), pages 1627-1637, 2000   DOI   ScienceOn
9 J. O. Kwon, I. R. Jeong, D. H. Lee. Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model, In Proc. of IWSEC '06, LNCS 4266, pp. 322-336, 2006
10 Q. Tang and L. Chen. Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols, IACR ePrint Archive, 2005/197, 2005
11 J. W. Byun and D.H. Lee. Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols, IACR ePrint Archive, 2005/209, 2005