Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

A password-authenticated key exchange (PAKE) protocol in the three-party setting allows two users communicating over a public network to agree on a common session key by the help of a server. In the setting the users do not share a password between themselves, but only with the server. In this paper, we explore the possibility of designing a round-efficient three-party PAKE protocol with a method to protect against undetectable on-line dictionary attacks without using the random oracle. The protocol matches the most efficient three-party PAKE protocol secure against undetectable on-line dictionary attacks among those found in the literature while providing the same level of security. Finally, we indentify the relations between detectable on-line and undetectable on-line dictionary attacks by providing counter-examples to support the observed relations1.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages977-980
Number of pages4
Volume3991 LNCS - I
DOIs
Publication statusPublished - 2006 Aug 7
EventICCS 2006: 6th International Conference on Computational Science - Reading, United Kingdom
Duration: 2006 May 282006 May 31

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3991 LNCS - I
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherICCS 2006: 6th International Conference on Computational Science
CountryUnited Kingdom
CityReading
Period06/5/2806/5/31

Keywords

  • Cryptography
  • Dictionary attacks
  • Mobile network security
  • Password-authenticated key exchange
  • Round complexity

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks'. Together they form a unique fingerprint.

  • Cite this

    Kwon, J. O., Sakurai, K., & Lee, D. H. (2006). Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3991 LNCS - I, pp. 977-980). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3991 LNCS - I). https://doi.org/10.1007/11758501_152