Efficient password-based authenticated key exchange without public information

Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Since the first password-based authenticated key exchange (PAKE) was proposed, it has enjoyed a considerable amount of interest from the cryptographic research community. To our best knowledge, most of proposed PAKEs based on Diffie-Hellman key exchange need some public information, such as generators of a finite cyclic group. However, in a client-server environment, not all servers use the same public information, which demands clients authenticate those public information before beginning PAKE. It is cumbersome for users. What's worse, it may bring some secure problems with PAKE, such as substitution attack. To remove these problems, in this paper, we present an efficient password-based authenticated key exchange protocol without any public information. We also provide a formal security analysis in the non-concurrent setting, including basic security, mutual authentication, and forward secrecy, by using the random oracle model.

Original languageEnglish
Title of host publicationComputer Security - ESORICS 2007 - 12th European Symposium on Research in Computer Security, Proceedings
PublisherSpringer Verlag
Pages299-310
Number of pages12
ISBN (Print)9783540748342
DOIs
StatePublished - 2007
Externally publishedYes
Event12th European Symposium on Research in Computer Security, ESORICS 2007 - Dresden, Germany
Duration: 24 Sep 200726 Sep 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4734 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th European Symposium on Research in Computer Security, ESORICS 2007
Country/TerritoryGermany
CityDresden
Period24/09/0726/09/07

Fingerprint

Dive into the research topics of 'Efficient password-based authenticated key exchange without public information'. Together they form a unique fingerprint.

Cite this