Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.6.127

Efficient Password-based Key Exchange Protocol for Two users Registered in a Server  

Shin Seong-chul (Republic of Korea Naval Academy)
Lee Sung-woon (Tongmyong University)
Abstract
This paper presents a password-based key exchange protocol to guarantee secure communications for two users registered in a sever. In this protocol, the server is only responsible for the legality of the users but does not how the session key agreed between them. The protocol can resist the various attacks including server compromise attack and provide the perfect forward secrecy. The proposed protocol is efficient in terms of computation cost because of not employing the sewer's public key.
Keywords
Cryptography; Authentication; Password; Key exchange; Key agreement;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. M. Bellovin and M. Merrit, 'Encrypted key exchange: Password-based protocols secure against dictionary attacks,' Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 72-84, 1992
2 Y. Ding and P. Horster, 'Undetectable on-line password guessing attacks,' ACM Operating Systems Review, vol. 29, no. 4, pp. 77-86, 1995   DOI   ScienceOn
3 C. Lin, H. Sun, and T. Hwang, 'Threeparty encrypted key exchange: Attacks and a solution,' ACM Operating Systems Review, vol. 34, no. 4, pp. 12-20, 2000   DOI
4 C. Lin, H. Sun, M. Steiner, and T. Hwang, 'Three-party Encrypted Key Exchange Without Server Public Keys,' IEEE Communication Letters, vol. 5, no. 12, pp. 497-499, 2001   DOI   ScienceOn
5 C. Chang and Y. Chang, 'A novel three-party encrypted key exchange protocol,' Computer Standards & Interfaces, vol. 26, no. 5, pp. 471-476, 2004   DOI   ScienceOn
6 H. Sun, B. Chen, and T. Hwang, 'Secure key agreement protocols for three-party against guessing attacks,' The Journal of Systems and Software, vol. 75, no. 1-2, pp. 63-68, 2005   DOI   ScienceOn
7 M. Steiner, G. Tsudik, and M. Waidner, 'Refinement and extension of Encrypted Key Exchange,' ACM Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995   DOI   ScienceOn