2013
DOI: 10.1002/sec.717
|View full text |Cite
|
Sign up to set email alerts
|

Efficient three‐party encrypted key exchange using trapdoor functions

Abstract: Three‐party encrypted key exchange (3PEKE) enables two communicating parties to securely exchange confidential and authenticated information over an insecure network via a trusted server. This investigation presents a novel efficient and secure 3PEKE protocol using a super‐poly‐to‐one trapdoor function. The proposed protocol employs the Diffie–Hellman key exchange and adopts the technique that the clients can publicly exchange the factors for generating the session key without the help of the server to reduce … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…• The recent protocol of Tsai and Chang [30] can run in two rounds (without key confirmation), but this protocol only works in a hybrid setting that requires both a cryptographic key and a password pre-established between each client and the server (see [4,29,[36][37][38][39][40][41][42][43][44] for other protocols designed to work in a hybrid setting). Table 1 summarizes the security properties and known weaknesses of published two-round three-party PAKE protocols with (claimed) proofs of security.…”
Section: Introductionmentioning
confidence: 99%
“…• The recent protocol of Tsai and Chang [30] can run in two rounds (without key confirmation), but this protocol only works in a hybrid setting that requires both a cryptographic key and a password pre-established between each client and the server (see [4,29,[36][37][38][39][40][41][42][43][44] for other protocols designed to work in a hybrid setting). Table 1 summarizes the security properties and known weaknesses of published two-round three-party PAKE protocols with (claimed) proofs of security.…”
Section: Introductionmentioning
confidence: 99%
“…Because each client needs to remember a separate password for each partner, for a large number of clients, it may overweigh the storage capacity of the clients. To avoid this problem, PAKE protocols have been developed for setting between three parties (in short, 3PAKE) . In a 3PAKE protocol, a trusted server mediates between two communication clients, and each client only has to share a memorable password with the server.…”
Section: Introductionmentioning
confidence: 99%
“…Generally, there are two main approaches to protect 3PAKE protocols against dictionary attacks. The first approach is to use either server's public key or symmetric cryptosystems, or a combination of both (e.g., ), and the second approach is without using server's public key or symmetric cryptosystems (e.g., ). Using server's public key and symmetric cryptosystems requires to construct a key management mechanism and constrain more complexity and computational cost to the protocol.…”
Section: Introductionmentioning
confidence: 99%