Abstract
This paper considers the issue on authenticated two-party key agreement protocol over an insecure public network. Many authenticated key agreement protocols have been proposed to meet the challenges. However, existing protocols are either limited by the use of public key infrastructure or by their security, suffering dictionary attack. To overcome these disadvantages, we propose an efficient two-party password-based key agreement protocol resistant to the dictionary attacks by adding password-authentication services. Under the Computation Gap Diffie-Hellman assumption, we will show the proposed protocol is provably secure in both the ideal-cipher model and the random-oracle model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key agreement secure against dictionary attacks. In: Proceedings of EUROCRYT’00, LNCS, vol 1807. Springer, Berlin, pp 139–155
Bellovin S, Merritt M (1999) Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE computer society symposium on research in security and privacy. IEEE Press, New York, pp 72–84
Zheng MH, Zhou HH, Li J, Cui GH (2009) Efficient and provably secure password-based group key agreement protocol. Comput Stand Interfaces 31(5):948–953
Joux A (2000) One round protocol for tripartite Diffie-Hellman. In: Proceedings of ANTS, LNCS, vol 1838. Springer, Berlin, pp 385–394
Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. Proceedings of PKC’05, LNCS, vol 3386. Springer, Berlin, pp 65–84
Bresson E, Chevassut O, Pointcheval D (2002) Group Diffie-Hellman key exchange secure against dictionary attack. Proceedings of ASIACRYPT’02, LNCS, vol 2501. Springer, Berlin, pp 497–514
Byun JW, Lee DH, Lim JI (2007) EC2C-PAKA: an efficient client-to-client password-authenticated key agreement. Info Sci 177(19):3995–4013
Acknowledgments
This work was partially supported by the Natural Science Foundation of Huhei Province under Grant No. 2009CDA143 and D20111901.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media B.V.
About this paper
Cite this paper
Zhou, H., Wang, T., Zheng, M. (2011). Provably Secure Two-party Password-Based Key Agreement Protocol. In: Park, J., Jin, H., Liao, X., Zheng, R. (eds) Proceedings of the International Conference on Human-centric Computing 2011 and Embedded and Multimedia Computing 2011. Lecture Notes in Electrical Engineering, vol 102. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2105-0_21
Download citation
DOI: https://doi.org/10.1007/978-94-007-2105-0_21
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-2104-3
Online ISBN: 978-94-007-2105-0
eBook Packages: EngineeringEngineering (R0)