Title :
IB-KEM based password authenticated key exchange protocol
Author :
Junhan Yang;Bo Su
Author_Institution :
School of Computer, Xi´an University of Science and Technology, Xi´an, Shaanxi 710054, China
Abstract :
Cryptanalysis of Chang et al. proposed a communication-efficient three-party password authenticated key exchange protocol, we found that their protocol easily suffers from password-compromise impersonation attack and privileged impersonation attack. In this paper, we introduce a novel three-party password authenticated key exchange protocol based on IB-KEM under HDH assumption. Security analysis has shown that our protocol achieved the following security requirements: (1) Forward security; (2) Mutual authentication; (3) Off-line/on-line password guessing attack resistance; (4) Password compromise impersonation attack resistance; (5) Privileged impersonation attack resistance.
Keywords :
"Protocols","Servers","Encapsulation","Authentication","Resistance","Cryptography"
Conference_Titel :
Signal Processing, Communications and Computing (ICSPCC), 2015 IEEE International Conference on
Print_ISBN :
978-1-4799-8918-8
DOI :
10.1109/ICSPCC.2015.7338831