2013
DOI: 10.5755/j01.itc.42.3.1905
|View full text |Cite
|
Sign up to set email alerts
|

Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification

Abstract: A Three-Party Password-based Authenticated Key Exchange (3PAKE) protocol allows two users to establish a secure session key over an insecure communication channel with the help of a third party, which is a trusted server. Recently, Lou and Huang proposed a 3PAKE which is efficient and suitable for running on resourceconstrained devices such as smart cards and mobile phones. In this paper, we show that their scheme is vulnerable to off-line password guessing attack and partition attack. We then propose an effic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 20 publications
0
12
0
Order By: Relevance
“…Applied p calculus is one of the dominant method belongs to a class of algebraic methods. ProVerif is an automated tool which make use of applied p calculus to verify cryptographic protocols [36]. ProVerif can verify trace equivalences like reachability, authentication and secrecy to prove a given protocol cannot reach to a bad state [37].…”
Section: Protocol Verification Using Proverifmentioning
confidence: 99%
“…Applied p calculus is one of the dominant method belongs to a class of algebraic methods. ProVerif is an automated tool which make use of applied p calculus to verify cryptographic protocols [36]. ProVerif can verify trace equivalences like reachability, authentication and secrecy to prove a given protocol cannot reach to a bad state [37].…”
Section: Protocol Verification Using Proverifmentioning
confidence: 99%
“…In this regard, different 3-PAKE and ECC-based schemes are reviewed to analyze the effectiveness, usefulness, and security strengths for providing reliable security solutions. Xie et al have proposed an ECC-based efficient 3-PAKE scheme [12] that overcomes the flaws mentioned above but suffers from offline password guessing attacks. Che et al have proposed modular exponentiation on an ECC-based 3-PAKE scheme [13] to make it more complicated for the attacker, but these operations require huge computational cost as compared to existing counterparts.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Bellovin and Merritt [2] proposed the first twoparty authenticated key exchange (2PAKE) protocol which is employed to establish a session key between two communication parties. After that, numerous 2PAKE protocols were presented for different communication environments [3][4][5][6][7][8][9][10][11][12]. However, 2PAKE protocols cannot be applied in large-scale peer-to-peer architecture since each user must store a different password for each partner it communicates with which may strain the storage capacity of the users.…”
Section: Introductionmentioning
confidence: 99%