Abstract
Password-based authenticated key agreement enables several parties to establish a shared cryptographically strong key over an insecure network using short low entropy passwords. This authenticated key agreement is definitely the most interesting in practice, since no additional device is required, but just a human-memorable password, for authenticating the players. Recently, Zhou et al. showed an efficient provably secure two-party pass-word-based authenticated key agreement (PAKA) protocol. In this paper, we propose an efficient two-party PAKA protocol and show a formal security proof. Our construction is more efficient than Zhou et al.’s.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644–654 (1976)
Tian, H.B., Susilo, W., Ming, Y., et al.: A provable secure ID-based explicit authenticated key agreement protocol without random oracles. J. Comput. Sci. Technol. 23(5), 832–842 (2008)
Dheerendra, M., Sourav, M.: Cryptanalysis of pairing-free identity-based authenticated key agreement protocols. Inf. Syst. Secur. 8303, 247–254 (2013)
Leu, J.S., Hsieh, W.B.: Efficient and secure dynamic id-based remote user authentication scheme for distributed systems using smart cards. IET Inf. Secur. 8(2), 104–113 (2014)
Tan, Z.W.: An efficient pairing-free identity-based authenticated group key agreement protocol. Int. J. Commun. Syst. 28(3), 534–545 (2015)
Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 72–84 (1992)
Bellovin, S.M., Merritt, M.: Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. In: Proceedings of the 1st ACM Conference on Computer and Communication Security, pp. 244–250 (1993)
Steiner, M., Tsudik, G., Waidner, M.: Refinement and extension of encrypted key exchange. ACM SIGOPS Oper. Syst. Rev. 29(3), 22–30 (1995)
Jablon, D.P.: Strong password-only authenticated key exchange. SIGCOMM Comput. Commun. Rev. 26(5), 5–26 (1996)
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Proceedings of EUROCRYPT 2000, pp. 139–155 (2000)
MacKenzie, P.D., Patel, S., Swaminathan, R.: Password-authenticated key exchange based on RSA. In: Proceedings of ASIACRYPT 2000, pp. 599–613 (2000)
Katz, J., Vaikuntanathan, V.: Round-optimal password-based authenticated key exchange. J. Cryptol. 26(4), 714–743 (2013)
Zhou, H.H., Wang, T., Zheng, M.H.: Provably secure two-party password-based key agreement protocol. In: Proceedings of HumanCom and EMC 2011, pp. 213–221 (2011)
Law, L., Menezes, A., Qu, M.H., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Des. Codes Crypt. 28(2), 119–134 (2003)
Zheng, M.H., Zhou, H.H., Chen, J.: An efficient protocol for two-party explicit authenticated key agreement. Concurrency Comput. Pract. Exp. 27(12), 2954–2963 (2015)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)
Byun, J.W., Lee, D.H., Lim, J.I.: EC2C-PAKA: an efficient client-to-client password-authenticated key agreement. Inf. Sci. 177(19), 3995–4013 (2007)
Zheng, M.H., Zhou, H.H., Cui, G.H.: Efficient and provably secure password-based group key agreement protocol. Comput. Stand. Interfaces 31(5), 948–953 (2009)
Susilo, W., Baek, J.: On the security of the identity-based encryption based on DHIES from ASIACCS 2010 (short paper). In: Proceedings of the 6th International Symposium on ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pp. 376–380 (2011)
Boneh, D., Franklin, M.: Identity-Based encryption from the weil pairing. In: Proceedings of CRYPTO 2001, pp. 231–229 (2001)
Acknowledgments
The work was supported by the Educational Commission of Hubei Province of China (No. D20151401) and the Green Industry Technology Leading Project of Hubei University of Technology (No. ZZTS2017006).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Xu, H., Wang, Q., Zhou, J., Ruan, O. (2018). An Efficient Provably Secure Password-Based Authenticated Key Agreement. In: Barolli, L., Enokido, T. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2017. Advances in Intelligent Systems and Computing, vol 612. Springer, Cham. https://doi.org/10.1007/978-3-319-61542-4_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-61542-4_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61541-7
Online ISBN: 978-3-319-61542-4
eBook Packages: EngineeringEngineering (R0)