Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

A password-authenticated key exchange (PAKE) protocol in the three-party setting allows two users communicating over a public network to agree on a common session key by the help of a server. In the setting the users do not share a password between themselves, but only with the server. In this paper, we explore the possibility of designing a round-efficient three-party PAKE protocol with a method to protect against undetectable on-line dictionary attacks without using the random oracle. The protocol matches the most efficient three-party PAKE protocol secure against undetectable on-line dictionary attacks among those found in the literature while providing the same level of security. Finally, we indentify the relations between detectable on-line and undetectable on-line dictionary attacks by providing counter-examples to support the observed relations1.

Original languageEnglish
Title of host publicationComputational Science - ICCS 2006
Subtitle of host publication6th International Conference, Proceedings
PublisherSpringer Verlag
Pages977-980
Number of pages4
ISBN (Print)3540343792, 9783540343790
DOIs
Publication statusPublished - 2006
EventICCS 2006: 6th International Conference on Computational Science - Reading, United Kingdom
Duration: 2006 May 282006 May 31

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3991 LNCS - I
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherICCS 2006: 6th International Conference on Computational Science
Country/TerritoryUnited Kingdom
CityReading
Period06/5/2806/5/31

Keywords

  • Cryptography
  • Dictionary attacks
  • Mobile network security
  • Password-authenticated key exchange
  • Round complexity

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks'. Together they form a unique fingerprint.

Cite this