Secure and efficient password-based authenticated key exchange protocol for two-server architecture

Ho Lee Jun, Hoon Lee Dong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

A great part of protocols for password-based authenticated key exchange system are designed for a single-server environment where all the information about legitimate users is stored in one server. Therefore, a credential weakness is existed in this approach because the user's password is exposed if this server is ever compromised. In 2006, Yang et al. proposed a practical two-server authenticated key exchange system which split user's password into two and store them into the servers respectively. They also extended the basic two-server model to an architecture in which multiple service servers were supported by single control server, but they didn 't demonstrate an adequate protocol in the extended model. In this paper, we present a protocol which is suitable for the extended model. In addition, we describe that our proposed protocol is robust against various known attacks and has a user-friendness.

Original languageEnglish
Title of host publication2007 International Conference on Convergence Information Technology, ICCIT 2007
Pages2102-2107
Number of pages6
DOIs
Publication statusPublished - 2007
Event2nd International Conference on Convergent Information Technology, ICCIT 07 - Gyongju, Korea, Republic of
Duration: 2007 Nov 212007 Nov 23

Publication series

Name2007 International Conference on Convergence Information Technology, ICCIT 2007

Other

Other2nd International Conference on Convergent Information Technology, ICCIT 07
Country/TerritoryKorea, Republic of
CityGyongju
Period07/11/2107/11/23

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Communication
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Secure and efficient password-based authenticated key exchange protocol for two-server architecture'. Together they form a unique fingerprint.

Cite this