Design an efficient three-party authenticated key exchange protocol in the cloud environment
نویسندگان
چکیده
With the emergence of cloud computing, conventional threeparty authenticated key exchange (3PAKE) protocols face two common problems; one is that the server and users are not in the same domain, and therefore, the shared authenticated keys may be unknowingly compromised. The other problem is these protocols require higher on-line computation cost and on-line communication cost during session key agreement, which can create excessive overhead for cloud clients using devices with low computational capacity. This paper proposes a novel protocol based on the self-verified token pair scheme employed by Chen et al. The proposed protocol does not require that the authenticated keys be stored in clouds to achieve user authentication. Furthermore, it overcomes the security threats existing in the protocol developed by Chen et al. and improves the performance in session key agreement to make it suitable for 3PAKE in cloud environments.
منابع مشابه
An Efficient Password-Only Authenticated Three-Party Key Exchange Protocol
Password-only authenticated key exchange (PAKE) protocols allow to generate cryptographically strong keys from humanmemorable passwords. The design of an efficient PAKE protocol is difficult, especially in the three-party setting where dictionary attacks by malicious insiders are a major concern. The difficulty is well illustrated by the fact that after twenty years of research, only a handful ...
متن کاملEnhancements of a three-party password-based authenticated key exchange protocol
This paper discusses the security for a simple and efficient three-party password-based authenticated key exchange protocol proposed by Huang most recently. Our analysis shows her protocol is still vulnerable to three kinds of attacks: 1). undetectable on-line dictionary attacks, 2). key-compromise impersonation attack. Thereafter we propose an enhanced protocol that can defeat the attacks desc...
متن کاملCryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC
Quite recently, Yang et al. presented an efficient three-party authenticated key exchange protocol based upon elliptic curve cryptography (ECC) for mobile-commerce environments. In this paper, we demonstrate that Yang et al.’s three-party authenticated protocol is potentially vulnerable to an unknown key-share attack and impersonation attack. Thereafter, we suggest a secure and efficient three-...
متن کاملWeaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography
Quite recently, Yang et al. presented an efficient three-party authenticated key exchange protocol based upon elliptic curve cryptography for mobile-commerce environments. In this paper, we demonstrate that Yang et al’s three-party authenticated protocol is potentially vulnerable to an unknown key-share attack and impersonation attack. Thereafter, we suggest a secure and efficient three-party a...
متن کاملA New Ring-Based SPHF and PAKE Protocol On Ideal Lattices
emph{ Smooth Projective Hash Functions } ( SPHFs ) as a specific pattern of zero knowledge proof system are fundamental tools to build many efficient cryptographic schemes and protocols. As an application of SPHFs, emph { Password - Based Authenticated Key Exchange } ( PAKE ) protocol is well-studied area in the last few years. In 2009, Katz and Vaikuntanathan described the first lattice-based ...
متن کامل