科研成果详情

发表状态已发表Published
题名Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
作者
发表日期2013-06-20
发表期刊Information Sciences
ISSN/eISSN0020-0255
卷号235页码:329-340
摘要

Three-party password-based authenticated key exchange (3PAKE) protocols allow two users (clients) to establish a session key with the support from an authenticated server over an insecure channel. Several 3PAKE protocols, which do not require server public keys, have been proposed recently. In this paper, we use Chang, et al.'s protocol as a case study and demonstrate that all of the 3PAKE protocols without server public keys are not secure against Key Compromise Impersonation (KCI) attack. A detailed analysis of flaw in these protocols has been conducted and we hope that by identifying this design flaw, similar structural mistakes can be avoided in future designs. Furthermore, we propose an improved protocol that remedies the weakness of these protocols and prove its security in a widely accepted model. © 2012 Elsevier Inc. All rights reserved.

关键词Authentication Key Compromise Impersonation (KCI) attack Password-based Three-party key exchange
DOI10.1016/j.ins.2013.02.004
URL查看来源
收录类别SCIE
语种英语English
WOS研究方向Computer Science
WOS类目Computer Science, Information Systems
WOS记录号WOS:000317887100023
Scopus入藏号2-s2.0-84875929826
引用统计
文献类型期刊论文
条目标识符https://repository.uic.edu.cn/handle/39GCC9TT/13536
专题个人在本单位外知识产出
通讯作者Xiong, Hu
作者单位
1.School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu,China
2.State Key Laboratory of Rail Traffic Control and Safety,Beijing Jiao Tong University,Beijing,China
3.Institute of Software,School of Electronics Engineering and Computer Science,Peking University,Beijing,China
4.State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing,China
推荐引用方式
GB/T 7714
Xiong, Hu,Chen, Yanan,Guan, Zhiet al. Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys[J]. Information Sciences, 2013, 235: 329-340.
APA Xiong, Hu, Chen, Yanan, Guan, Zhi, & Chen, Zhong. (2013). Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Information Sciences, 235, 329-340.
MLA Xiong, Hu,et al."Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys". Information Sciences 235(2013): 329-340.
条目包含的文件
条目无相关文件。
个性服务
查看访问统计
谷歌学术
谷歌学术中相似的文章
[Xiong, Hu]的文章
[Chen, Yanan]的文章
[Guan, Zhi]的文章
百度学术
百度学术中相似的文章
[Xiong, Hu]的文章
[Chen, Yanan]的文章
[Guan, Zhi]的文章
必应学术
必应学术中相似的文章
[Xiong, Hu]的文章
[Chen, Yanan]的文章
[Guan, Zhi]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。