Security analysis and enhancements of a three-party authenticated key agreement protocol
Autor(a) principal: | |
---|---|
Data de Publicação: | 2015 |
Outros Autores: | , |
Tipo de documento: | Artigo |
Idioma: | eng |
Título da fonte: | Acta scientiarum. Technology (Online) |
Texto Completo: | http://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/article/view/25240 |
Resumo: | Three-party authenticated key agreement (3PAKA) protocol is an important cryptographic mechanism for secure communication, which allows two clients to generate a shared session key with the help of the server. Recently, Tan proposed a communication and computation-efficient 3PAKA protocol. Compared with related protocols, Tan’s protocol requires fewer rounds, lower communication cost and smaller computation cost. Tan claimed that his protocol was secure against various attacks. Unfortunately, we found that his protocol cannot withstand the key compromise impersonation attack. To improve security, we proposed a new 3PAKA protocol. Security analysis and performance analysis show our 3PAKA protocol could overcome weakness in Tan’s protocol at the cost of increasing the computational cost slightly. |
id |
UEM-6_32040e720774bb3fa1dd13cf2de447f7 |
---|---|
oai_identifier_str |
oai:periodicos.uem.br/ojs:article/25240 |
network_acronym_str |
UEM-6 |
network_name_str |
Acta scientiarum. Technology (Online) |
repository_id_str |
|
spelling |
Security analysis and enhancements of a three-party authenticated key agreement protocolauthenticated key agreementthree-partyprovable security.Three-party authenticated key agreement (3PAKA) protocol is an important cryptographic mechanism for secure communication, which allows two clients to generate a shared session key with the help of the server. Recently, Tan proposed a communication and computation-efficient 3PAKA protocol. Compared with related protocols, Tan’s protocol requires fewer rounds, lower communication cost and smaller computation cost. Tan claimed that his protocol was secure against various attacks. Unfortunately, we found that his protocol cannot withstand the key compromise impersonation attack. To improve security, we proposed a new 3PAKA protocol. Security analysis and performance analysis show our 3PAKA protocol could overcome weakness in Tan’s protocol at the cost of increasing the computational cost slightly. Universidade Estadual De Maringá2015-07-01info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdfhttp://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/article/view/2524010.4025/actascitechnol.v37i3.25240Acta Scientiarum. Technology; Vol 37 No 3 (2015); 329-336Acta Scientiarum. Technology; v. 37 n. 3 (2015); 329-3361806-25631807-8664reponame:Acta scientiarum. Technology (Online)instname:Universidade Estadual de Maringá (UEM)instacron:UEMenghttp://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/article/view/25240/pdf_96Wang, ZhihengHuo, ZhanqiangShi, Wenboinfo:eu-repo/semantics/openAccess2015-09-11T09:21:42Zoai:periodicos.uem.br/ojs:article/25240Revistahttps://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/indexPUBhttps://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/oai||actatech@uem.br1807-86641806-2563opendoar:2015-09-11T09:21:42Acta scientiarum. Technology (Online) - Universidade Estadual de Maringá (UEM)false |
dc.title.none.fl_str_mv |
Security analysis and enhancements of a three-party authenticated key agreement protocol |
title |
Security analysis and enhancements of a three-party authenticated key agreement protocol |
spellingShingle |
Security analysis and enhancements of a three-party authenticated key agreement protocol Wang, Zhiheng authenticated key agreement three-party provable security. |
title_short |
Security analysis and enhancements of a three-party authenticated key agreement protocol |
title_full |
Security analysis and enhancements of a three-party authenticated key agreement protocol |
title_fullStr |
Security analysis and enhancements of a three-party authenticated key agreement protocol |
title_full_unstemmed |
Security analysis and enhancements of a three-party authenticated key agreement protocol |
title_sort |
Security analysis and enhancements of a three-party authenticated key agreement protocol |
author |
Wang, Zhiheng |
author_facet |
Wang, Zhiheng Huo, Zhanqiang Shi, Wenbo |
author_role |
author |
author2 |
Huo, Zhanqiang Shi, Wenbo |
author2_role |
author author |
dc.contributor.author.fl_str_mv |
Wang, Zhiheng Huo, Zhanqiang Shi, Wenbo |
dc.subject.por.fl_str_mv |
authenticated key agreement three-party provable security. |
topic |
authenticated key agreement three-party provable security. |
description |
Three-party authenticated key agreement (3PAKA) protocol is an important cryptographic mechanism for secure communication, which allows two clients to generate a shared session key with the help of the server. Recently, Tan proposed a communication and computation-efficient 3PAKA protocol. Compared with related protocols, Tan’s protocol requires fewer rounds, lower communication cost and smaller computation cost. Tan claimed that his protocol was secure against various attacks. Unfortunately, we found that his protocol cannot withstand the key compromise impersonation attack. To improve security, we proposed a new 3PAKA protocol. Security analysis and performance analysis show our 3PAKA protocol could overcome weakness in Tan’s protocol at the cost of increasing the computational cost slightly. |
publishDate |
2015 |
dc.date.none.fl_str_mv |
2015-07-01 |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion |
format |
article |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/article/view/25240 10.4025/actascitechnol.v37i3.25240 |
url |
http://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/article/view/25240 |
identifier_str_mv |
10.4025/actascitechnol.v37i3.25240 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
http://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/article/view/25240/pdf_96 |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Universidade Estadual De Maringá |
publisher.none.fl_str_mv |
Universidade Estadual De Maringá |
dc.source.none.fl_str_mv |
Acta Scientiarum. Technology; Vol 37 No 3 (2015); 329-336 Acta Scientiarum. Technology; v. 37 n. 3 (2015); 329-336 1806-2563 1807-8664 reponame:Acta scientiarum. Technology (Online) instname:Universidade Estadual de Maringá (UEM) instacron:UEM |
instname_str |
Universidade Estadual de Maringá (UEM) |
instacron_str |
UEM |
institution |
UEM |
reponame_str |
Acta scientiarum. Technology (Online) |
collection |
Acta scientiarum. Technology (Online) |
repository.name.fl_str_mv |
Acta scientiarum. Technology (Online) - Universidade Estadual de Maringá (UEM) |
repository.mail.fl_str_mv |
||actatech@uem.br |
_version_ |
1799315335472480256 |