Security analysis and enhancements of a three-party authenticated key agreement protocol

Detalhes bibliográficos
Autor(a) principal: Wang, Zhiheng
Data de Publicação: 2015
Outros Autores: Huo, Zhanqiang, Shi, Wenbo
Tipo de documento: Artigo
Idioma: eng
Título da fonte: Acta scientiarum. Technology (Online)
Texto Completo: http://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/article/view/25240
Resumo: Three-party authenticated key agreement (3PAKA) protocol is an important cryptographic mechanism for secure communication, which allows two clients to generate a shared session key with the help of the server. Recently, Tan proposed a communication and computation-efficient 3PAKA protocol. Compared with related protocols, Tan’s protocol requires fewer rounds, lower communication cost and smaller computation cost. Tan claimed that his protocol was secure against various attacks. Unfortunately, we found that his protocol cannot withstand the key compromise impersonation attack. To improve security, we proposed a new 3PAKA protocol. Security analysis and performance analysis show our 3PAKA protocol could overcome weakness in Tan’s protocol at the cost of increasing the computational cost slightly. 
id UEM-6_32040e720774bb3fa1dd13cf2de447f7
oai_identifier_str oai:periodicos.uem.br/ojs:article/25240
network_acronym_str UEM-6
network_name_str Acta scientiarum. Technology (Online)
repository_id_str
spelling Security analysis and enhancements of a three-party authenticated key agreement protocolauthenticated key agreementthree-partyprovable security.Three-party authenticated key agreement (3PAKA) protocol is an important cryptographic mechanism for secure communication, which allows two clients to generate a shared session key with the help of the server. Recently, Tan proposed a communication and computation-efficient 3PAKA protocol. Compared with related protocols, Tan’s protocol requires fewer rounds, lower communication cost and smaller computation cost. Tan claimed that his protocol was secure against various attacks. Unfortunately, we found that his protocol cannot withstand the key compromise impersonation attack. To improve security, we proposed a new 3PAKA protocol. Security analysis and performance analysis show our 3PAKA protocol could overcome weakness in Tan’s protocol at the cost of increasing the computational cost slightly. Universidade Estadual De Maringá2015-07-01info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdfhttp://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/article/view/2524010.4025/actascitechnol.v37i3.25240Acta Scientiarum. Technology; Vol 37 No 3 (2015); 329-336Acta Scientiarum. Technology; v. 37 n. 3 (2015); 329-3361806-25631807-8664reponame:Acta scientiarum. Technology (Online)instname:Universidade Estadual de Maringá (UEM)instacron:UEMenghttp://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/article/view/25240/pdf_96Wang, ZhihengHuo, ZhanqiangShi, Wenboinfo:eu-repo/semantics/openAccess2015-09-11T09:21:42Zoai:periodicos.uem.br/ojs:article/25240Revistahttps://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/indexPUBhttps://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/oai||actatech@uem.br1807-86641806-2563opendoar:2015-09-11T09:21:42Acta scientiarum. Technology (Online) - Universidade Estadual de Maringá (UEM)false
dc.title.none.fl_str_mv Security analysis and enhancements of a three-party authenticated key agreement protocol
title Security analysis and enhancements of a three-party authenticated key agreement protocol
spellingShingle Security analysis and enhancements of a three-party authenticated key agreement protocol
Wang, Zhiheng
authenticated key agreement
three-party
provable security.
title_short Security analysis and enhancements of a three-party authenticated key agreement protocol
title_full Security analysis and enhancements of a three-party authenticated key agreement protocol
title_fullStr Security analysis and enhancements of a three-party authenticated key agreement protocol
title_full_unstemmed Security analysis and enhancements of a three-party authenticated key agreement protocol
title_sort Security analysis and enhancements of a three-party authenticated key agreement protocol
author Wang, Zhiheng
author_facet Wang, Zhiheng
Huo, Zhanqiang
Shi, Wenbo
author_role author
author2 Huo, Zhanqiang
Shi, Wenbo
author2_role author
author
dc.contributor.author.fl_str_mv Wang, Zhiheng
Huo, Zhanqiang
Shi, Wenbo
dc.subject.por.fl_str_mv authenticated key agreement
three-party
provable security.
topic authenticated key agreement
three-party
provable security.
description Three-party authenticated key agreement (3PAKA) protocol is an important cryptographic mechanism for secure communication, which allows two clients to generate a shared session key with the help of the server. Recently, Tan proposed a communication and computation-efficient 3PAKA protocol. Compared with related protocols, Tan’s protocol requires fewer rounds, lower communication cost and smaller computation cost. Tan claimed that his protocol was secure against various attacks. Unfortunately, we found that his protocol cannot withstand the key compromise impersonation attack. To improve security, we proposed a new 3PAKA protocol. Security analysis and performance analysis show our 3PAKA protocol could overcome weakness in Tan’s protocol at the cost of increasing the computational cost slightly. 
publishDate 2015
dc.date.none.fl_str_mv 2015-07-01
dc.type.driver.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/article/view/25240
10.4025/actascitechnol.v37i3.25240
url http://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/article/view/25240
identifier_str_mv 10.4025/actascitechnol.v37i3.25240
dc.language.iso.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv http://www.periodicos.uem.br/ojs/index.php/ActaSciTechnol/article/view/25240/pdf_96
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Universidade Estadual De Maringá
publisher.none.fl_str_mv Universidade Estadual De Maringá
dc.source.none.fl_str_mv Acta Scientiarum. Technology; Vol 37 No 3 (2015); 329-336
Acta Scientiarum. Technology; v. 37 n. 3 (2015); 329-336
1806-2563
1807-8664
reponame:Acta scientiarum. Technology (Online)
instname:Universidade Estadual de Maringá (UEM)
instacron:UEM
instname_str Universidade Estadual de Maringá (UEM)
instacron_str UEM
institution UEM
reponame_str Acta scientiarum. Technology (Online)
collection Acta scientiarum. Technology (Online)
repository.name.fl_str_mv Acta scientiarum. Technology (Online) - Universidade Estadual de Maringá (UEM)
repository.mail.fl_str_mv ||actatech@uem.br
_version_ 1799315335472480256