Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 102))

Abstract

This paper considers the issue on authenticated two-party key agreement protocol over an insecure public network. Many authenticated key agreement protocols have been proposed to meet the challenges. However, existing protocols are either limited by the use of public key infrastructure or by their security, suffering dictionary attack. To overcome these disadvantages, we propose an efficient two-party password-based key agreement protocol resistant to the dictionary attacks by adding password-authentication services. Under the Computation Gap Diffie-Hellman assumption, we will show the proposed protocol is provably secure in both the ideal-cipher model and the random-oracle model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key agreement secure against dictionary attacks. In: Proceedings of EUROCRYT’00, LNCS, vol 1807. Springer, Berlin, pp 139–155

    Google Scholar 

  2. Bellovin S, Merritt M (1999) Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE computer society symposium on research in security and privacy. IEEE Press, New York, pp 72–84

    Google Scholar 

  3. Zheng MH, Zhou HH, Li J, Cui GH (2009) Efficient and provably secure password-based group key agreement protocol. Comput Stand Interfaces 31(5):948–953

    Article  Google Scholar 

  4. Joux A (2000) One round protocol for tripartite Diffie-Hellman. In: Proceedings of ANTS, LNCS, vol 1838. Springer, Berlin, pp 385–394

    Google Scholar 

  5. Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. Proceedings of PKC’05, LNCS, vol 3386. Springer, Berlin, pp 65–84

    Google Scholar 

  6. Bresson E, Chevassut O, Pointcheval D (2002) Group Diffie-Hellman key exchange secure against dictionary attack. Proceedings of ASIACRYPT’02, LNCS, vol 2501. Springer, Berlin, pp 497–514

    Google Scholar 

  7. Byun JW, Lee DH, Lim JI (2007) EC2C-PAKA: an efficient client-to-client password-authenticated key agreement. Info Sci 177(19):3995–4013

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work was partially supported by the Natural Science Foundation of Huhei Province under Grant No. 2009CDA143 and D20111901.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Minghui Zheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media B.V.

About this paper

Cite this paper

Zhou, H., Wang, T., Zheng, M. (2011). Provably Secure Two-party Password-Based Key Agreement Protocol. In: Park, J., Jin, H., Liao, X., Zheng, R. (eds) Proceedings of the International Conference on Human-centric Computing 2011 and Embedded and Multimedia Computing 2011. Lecture Notes in Electrical Engineering, vol 102. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2105-0_21

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-2105-0_21

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-2104-3

  • Online ISBN: 978-94-007-2105-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics