Key Exchange Protocol

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 11643 Experts worldwide ranked by ideXlab platform

David Pointcheval - One of the best experts on this subject based on the ideXlab platform.

  • a scalable password based group Key Exchange Protocol in the standard model
    Lecture Notes in Computer Science, 2006
    Co-Authors: Michel Abdalla, David Pointcheval
    Abstract:

    This paper presents a secure constant-round password-based group Key Exchange Protocol in the common reference string model. Our Protocol is based on the group Key Exchange Protocol by Burmester and Desmedt and on the 2-party password-based authenticated Protocols by Gennaro and Lindell, and by Katz, Ostrovsky, and Yung. The proof of security is in the standard model and based on the notion of smooth projective hash functions. As a result, it can be instantiated under various computational assumptions, such as decisional Diffie-Hellman, quadratic residuosity, and N-residuosity.

Michel Abdalla - One of the best experts on this subject based on the ideXlab platform.

  • a scalable password based group Key Exchange Protocol in the standard model
    Lecture Notes in Computer Science, 2006
    Co-Authors: Michel Abdalla, David Pointcheval
    Abstract:

    This paper presents a secure constant-round password-based group Key Exchange Protocol in the common reference string model. Our Protocol is based on the group Key Exchange Protocol by Burmester and Desmedt and on the 2-party password-based authenticated Protocols by Gennaro and Lindell, and by Katz, Ostrovsky, and Yung. The proof of security is in the standard model and based on the notion of smooth projective hash functions. As a result, it can be instantiated under various computational assumptions, such as decisional Diffie-Hellman, quadratic residuosity, and N-residuosity.

Tianjie Cao - One of the best experts on this subject based on the ideXlab platform.

  • provably secure three party password authenticated Key Exchange Protocol in the standard model
    Journal of Systems and Software, 2012
    Co-Authors: Junhan Yang, Tianjie Cao
    Abstract:

    Three-party password authenticated Key Exchange Protocol is a very practical mechanism to establish secure session Key through authenticating each other with the help of a trusted server. Most three-party password authenticated Key Exchange Protocols only guarantee security in the random oracle model. However, a random oracle based cryptographic construction may be insecure when the oracle is replaced by real function. Moreover, some previous unknown attacks appear with the advance of the adversary capability. Therefore, a suitable standard model which can imitate a wider variety of attack scenarios for 3PAKE Protocol is needed. Aim at resisting dictionary attack, unknown Key-share attack and password-compromise impersonation attack, an expanded standard model for 3PAKE Protocol is given. Meanwhile, through applying ElGamal encryption scheme and pseudorandom function, a specific three-party password authenticated Key Exchange Protocol is proposed. The security of the proposed Protocol is proven in the new standard model. The result shows that the present Protocol has stronger security by comparing with other existing Protocols, which covers the following security properties: (1) semantic security, (2) Key privacy, (3) client-to-server authentication, (4) mutual authentication, (5) resistance to various known attacks, and (6) forward security.

  • An Novel Anonymous Authenticated and Key Exchange Protocol
    Journal of Networks, 2009
    Co-Authors: Hui Cui, Tianjie Cao
    Abstract:

    Because of the growing importance in the fields of computer networks, how to keep user's privacy has drawn more and more concerns in recent years. In this paper, we first point out that the two given anonymous password-based authenticated and Key Exchange Protocols are vulnerable to the anonymity attack. Then based on a ring signature scheme, we propose a new secure anonymous authenticated and Key Exchange Protocol, which inherits all the good virtues of the previous Protocols. Furthermore, we discuss the security attributes of our new scheme. Finally, we give an extension of our new scheme's application and make a conclusion of this paper.

Maheswara Rao Valluri - One of the best experts on this subject based on the ideXlab platform.

Zhenfeng Zhang - One of the best experts on this subject based on the ideXlab platform.

  • a new anonymous password based authenticated Key Exchange Protocol
    International Conference on Cryptology in India, 2008
    Co-Authors: Jing Yang, Zhenfeng Zhang
    Abstract:

    In Indocrypt 2005 Viet et al. first proposed an anonymous password-based Key Exchange Protocol: APAKE and its extension: k -out-of-n APAKE. Then Shin et al. presented an improved Protocol TAP. In this paper, we first show that the TAP Protocol is vulnerable to two attacks. One is an impersonating attack and the other is an off-line dictionary attack, which is also applied to k -out-of-n APAKE. Furthermore, we propose a novel anonymous password-based Key Exchange Protocol, and prove its security in the random oracle model under the square computational Diffie-Hellman assumption and decision inverted-additive Diffie-Hellman assumption. We also extend our Protocol to the distributed setting, which is secure against the proposed attacks.