Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1352793.1352862acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Security design for three-party encrypted key exchange protocol using smart cards

Published: 31 January 2008 Publication History

Abstract

Three-Party encrypted key exchange (3PEKE) protocol is an important cryptographic mechanism, enabling two clients to communicate with each other through a trusted server. Specifically, it is often applied to provide confidential communications between two participants over an insecure network. In 2007, Lu and Cao proposed a simple and efficient version. Unfortunately, we find that there exists a design weakness in their mechanism. We therefore design a novel mechanism using smart cards. The smart-card based scheme (SC-3PEKE) not only confirms the security essentials of general 3PEKE methods, but also outperforms related works in terms of authentication overheads with the adoption of smart cards.

References

[1]
Chang, C. C., Chang, Y. F.: A Novel Three-party Encrypted Key Exchange Protocol. Computer Standards & Interfaces, vol. 26, (2004), pp. 471--476
[2]
Chang, Y. F., Chang, C. C., Liu, Y. L.: Password Authentication without the Server Public Key. IEICE Transactions on Communications, vol. E87-B, no. 10, (2004), pp. 3088--3091
[3]
Bellovin, S. M., Merrit, M.: Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks. Proceedings of 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, (1992), pp. 72--84
[4]
Jaung, W. J.: Efficient Three-party Key Exchange using Smart Cards. IEEE Transactions on Consumer Electronics, vol. 50, no. 2, (2004), pp. 619--624
[5]
Lin, C. L., Sun, H. M., Hwang, T.: Three-party Encrypted Key Exchange: Attacks and a Solution. ACM Operating Systems Review, vol. 34, no. 4, (2000), pp. 12--20
[6]
Lin, C. L., Sun, H. M., Steiner, M., Hwang, T.: Three-party Encrypted Key Exchange without Server Public Keys. IEEE Communications Letters, vol. 5, (2001), pp. 497--499
[7]
Lee, T. F., Hwang, T., Lin, C. L.: Enhanced Three-party Encrypted Key Exchange without Server Public Key. Computer & Security, vol. 23, (2004), pp. 571--577
[8]
Lu, R., Cao, Z.: Simple Three-party Key Exchange Protocol. Computer & Security, vol. 26, (2007), pp. 94--97
[9]
Rankl, W., Effing, W.: Smart Card Handbook, John Wiley and Sons, 2nd Edition (2000)
[10]
Sun, H. M., Chen B. C., Hwang, T.: Secure Key Agreement Protocols for Three-party against Guessing Attacks. The Journal of System and Software, vol. 75, (2005), pp. 63--68
[11]
Schneier, B.: Applied Cryptography, Protocols, Algorithms, and Source Code in C, John Wiley and Sons Inc., 2nd Edition, New York, U.S.A., pp. 15 (1996)
[12]
Steiner, M., Tsudik, G., Waidner, M.: Refinement and Extension of Encrypted Key Exchange. ACM Operating Systems Review, vol. 29, no. 3, (1995), pp. 22--30

Cited By

View all
  • (2016)Analyzing three-party authentication and key agreement protocol for real time IP multimedia server---client systemsMultimedia Tools and Applications10.1007/s11042-015-2542-475:10(5795-5817)Online publication date: 1-May-2016
  • (2015)Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart CardArabian Journal for Science and Engineering10.1007/s13369-015-1743-540:11(3135-3149)Online publication date: 24-Jun-2015
  • (2014)Provably secure three-party authenticated key agreement protocol using smart cardsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2013.08.02058(29-38)Online publication date: 1-Jan-2014

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communication
January 2008
604 pages
ISBN:9781595939937
DOI:10.1145/1352793
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 January 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 3PEKE
  2. communications
  3. off-line password guessing attack
  4. smart cards

Qualifiers

  • Research-article

Conference

ICUIMC08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 251 of 941 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Analyzing three-party authentication and key agreement protocol for real time IP multimedia server---client systemsMultimedia Tools and Applications10.1007/s11042-015-2542-475:10(5795-5817)Online publication date: 1-May-2016
  • (2015)Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart CardArabian Journal for Science and Engineering10.1007/s13369-015-1743-540:11(3135-3149)Online publication date: 24-Jun-2015
  • (2014)Provably secure three-party authenticated key agreement protocol using smart cardsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2013.08.02058(29-38)Online publication date: 1-Jan-2014

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media