Light-weight key exchange with different passwords in the standard model

Jeong Ok Kwon, ik rae Jeong, Dong Hoon Lee

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

In this paper, we consider password-based authenticated key exchange with different passwords, where the users only share a password with the trusted server but do not share between themselves. The server helps the users share a cryptographi-cally secure session key by using their different passwords. We propose a light-weight password-based authenticated key exchange protocol with different passwords, i.e., it requires only 2 rounds and 4 modular exponentiations per user. The protocol provides forward secrecy, known-key secrecy, key secrecy against the curious server, and security against undetectable online dictionary attacks without random oracles.

Original languageEnglish
Pages (from-to)1042-1064
Number of pages23
JournalJournal of Universal Computer Science
Volume15
Issue number5
Publication statusPublished - 2009 Jul 17

Fingerprint

Key Exchange
Password
Standard Model
Servers
Authenticated Key Exchange
Network protocols
Server
Glossaries
Modular Exponentiation
Random Oracle
Attack

Keywords

  • Different passwords
  • Forward secrecy
  • Key secrecy
  • Password-based key exchange

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Light-weight key exchange with different passwords in the standard model. / Kwon, Jeong Ok; Jeong, ik rae; Lee, Dong Hoon.

In: Journal of Universal Computer Science, Vol. 15, No. 5, 17.07.2009, p. 1042-1064.

Research output: Contribution to journalArticle

@article{383afdd7dee74a08a964b02d93f0c544,
title = "Light-weight key exchange with different passwords in the standard model",
abstract = "In this paper, we consider password-based authenticated key exchange with different passwords, where the users only share a password with the trusted server but do not share between themselves. The server helps the users share a cryptographi-cally secure session key by using their different passwords. We propose a light-weight password-based authenticated key exchange protocol with different passwords, i.e., it requires only 2 rounds and 4 modular exponentiations per user. The protocol provides forward secrecy, known-key secrecy, key secrecy against the curious server, and security against undetectable online dictionary attacks without random oracles.",
keywords = "Different passwords, Forward secrecy, Key secrecy, Password-based key exchange",
author = "Kwon, {Jeong Ok} and Jeong, {ik rae} and Lee, {Dong Hoon}",
year = "2009",
month = "7",
day = "17",
language = "English",
volume = "15",
pages = "1042--1064",
journal = "Journal of Universal Computer Science",
issn = "0948-6968",
publisher = "Springer Verlag",
number = "5",

}

TY - JOUR

T1 - Light-weight key exchange with different passwords in the standard model

AU - Kwon, Jeong Ok

AU - Jeong, ik rae

AU - Lee, Dong Hoon

PY - 2009/7/17

Y1 - 2009/7/17

N2 - In this paper, we consider password-based authenticated key exchange with different passwords, where the users only share a password with the trusted server but do not share between themselves. The server helps the users share a cryptographi-cally secure session key by using their different passwords. We propose a light-weight password-based authenticated key exchange protocol with different passwords, i.e., it requires only 2 rounds and 4 modular exponentiations per user. The protocol provides forward secrecy, known-key secrecy, key secrecy against the curious server, and security against undetectable online dictionary attacks without random oracles.

AB - In this paper, we consider password-based authenticated key exchange with different passwords, where the users only share a password with the trusted server but do not share between themselves. The server helps the users share a cryptographi-cally secure session key by using their different passwords. We propose a light-weight password-based authenticated key exchange protocol with different passwords, i.e., it requires only 2 rounds and 4 modular exponentiations per user. The protocol provides forward secrecy, known-key secrecy, key secrecy against the curious server, and security against undetectable online dictionary attacks without random oracles.

KW - Different passwords

KW - Forward secrecy

KW - Key secrecy

KW - Password-based key exchange

UR - http://www.scopus.com/inward/record.url?scp=67650332883&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=67650332883&partnerID=8YFLogxK

M3 - Article

VL - 15

SP - 1042

EP - 1064

JO - Journal of Universal Computer Science

JF - Journal of Universal Computer Science

SN - 0948-6968

IS - 5

ER -