loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Xun Yi 1 ; Raylin Tso 2 and Eiji Okamoto 3

Affiliations: 1 Victoria University, Australia ; 2 National Chengchi University, Taiwan ; 3 University of Tsukuba, Japan

ISBN: 978-989-8425-71-3

Keyword(s): Three-party PAKE, ID-based encryption scheme, ElGamal encryption scheme, Dictionary attack.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Identification, Authentication and Non-Repudiation ; Information and Systems Security ; Network Security ; Wireless Network Security

Abstract: Password-authenticated key exchange (PAKE) in the 3-party setting is where two clients, who do not share a password between themselves but only with a server, establish a common session key with the help of the server. Abdalla, Fouque and Pointcheval were the first formally to address 3-party PAKE issue and presented a natural and generic construction from any 2-party PAKE protocols. Soon after, Abdalla and Pointcheval presented a more efficient 3-party PAKE protocol and proved its security in the random oracle model. In this paper, we present a new 3-party PAKE protocol on the basis of identity-based encryption and ElGamal encryption schemes. In our protocol, the client needs to remember passwords and the server’s identity only while the server keeps passwords in addition to a private key related to its identity. We have put forth a formal model of security for ID-based 3-party PAKE, and provided a rigorous proof of security for our protocol without random oracles.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.227.240.143

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Yi, X.; Tso, R. and Okamoto, E. (2011). THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 15-24. DOI: 10.5220/0003446600150024

@conference{secrypt11,
author={Xun Yi. and Raylin Tso. and Eiji Okamoto.},
title={THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={15-24},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003446600150024},
isbn={978-989-8425-71-3},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES
SN - 978-989-8425-71-3
AU - Yi, X.
AU - Tso, R.
AU - Okamoto, E.
PY - 2011
SP - 15
EP - 24
DO - 10.5220/0003446600150024

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.