Design an efficient three-party authenticated key exchange protocol in the cloud environment

نویسندگان

  • Chung-Yi Lin
  • Yuh-Min Chen
  • Shu-Yi Liaw
  • Chen-Hua Fu
چکیده

With the emergence of cloud computing, conventional threeparty authenticated key exchange (3PAKE) protocols face two common problems; one is that the server and users are not in the same domain, and therefore, the shared authenticated keys may be unknowingly compromised. The other problem is these protocols require higher on-line computation cost and on-line communication cost during session key agreement, which can create excessive overhead for cloud clients using devices with low computational capacity. This paper proposes a novel protocol based on the self-verified token pair scheme employed by Chen et al. The proposed protocol does not require that the authenticated keys be stored in clouds to achieve user authentication. Furthermore, it overcomes the security threats existing in the protocol developed by Chen et al. and improves the performance in session key agreement to make it suitable for 3PAKE in cloud environments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Password-Only Authenticated Three-Party Key Exchange Protocol

Password-only authenticated key exchange (PAKE) protocols allow to generate cryptographically strong keys from humanmemorable passwords. The design of an efficient PAKE protocol is difficult, especially in the three-party setting where dictionary attacks by malicious insiders are a major concern. The difficulty is well illustrated by the fact that after twenty years of research, only a handful ...

متن کامل

Enhancements of a three-party password-based authenticated key exchange protocol

This paper discusses the security for a simple and efficient three-party password-based authenticated key exchange protocol proposed by Huang most recently. Our analysis shows her protocol is still vulnerable to three kinds of attacks: 1). undetectable on-line dictionary attacks, 2). key-compromise impersonation attack. Thereafter we propose an enhanced protocol that can defeat the attacks desc...

متن کامل

Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC

Quite recently, Yang et al. presented an efficient three-party authenticated key exchange protocol based upon elliptic curve cryptography (ECC) for mobile-commerce environments. In this paper, we demonstrate that Yang et al.’s three-party authenticated protocol is potentially vulnerable to an unknown key-share attack and impersonation attack. Thereafter, we suggest a secure and efficient three-...

متن کامل

Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography

Quite recently, Yang et al. presented an efficient three-party authenticated key exchange protocol based upon elliptic curve cryptography for mobile-commerce environments. In this paper, we demonstrate that Yang et al’s three-party authenticated protocol is potentially vulnerable to an unknown key-share attack and impersonation attack. Thereafter, we suggest a secure and efficient three-party a...

متن کامل

A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices

emph{ Smooth Projective Hash Functions } ( SPHFs ) as a specific pattern of zero knowledge proof system are fundamental tools to build many efficient cryptographic schemes and protocols. As an application of SPHFs, emph { Password - Based Authenticated Key Exchange } ( PAKE ) protocol is well-studied area in the last few years. In 2009, Katz and Vaikuntanathan described the first lattice-based ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014