Title
Cryptoanalysis and Improvement of Verifier-based Key Agreement Protocol in Cross-Realm Setting
Abstract
Most password-authenticated key agreement protocols have focused on authenticated key agreement using shared password between a client and a server. With the emergence of a variety of communication environments such as EPC global network, it is necessary to construct a secure channel between clients. Cross-realm client-to-client password-authenticated key agreement (C2C-PAKA) protocol can provide secure authenticated key agreement for two clients of different realms, who only share their passwords with their own servers. In 2009, Liu proposed a verifier-based key exchange protocol in cross-realm setting. However, the protocol is susceptible to server compromise attack. In this paper, we propose an improved verifier-based cross-realm C2C-PAKA protocol based on EC2C-PAKA protocol. While holding all the claiming security characteristics of the original protocol, the new protocol can resist server compromise attack. We have proved the improved protocol is secure under the Diffie-Hellman assumption and discrete logarithm assumption. In addition, the improved protocol only requires 12 modular exponentiation, which is more efficient and thus of greater practicality than previous solutions.
Year
DOI
Venue
2011
10.1109/CIS.2011.208
CIS
Keywords
Field
DocType
authenticated key agreement,original protocol,new protocol,verifier-based key agreement protocol,verifier-based key exchange protocol,password-authenticated key agreement protocol,improved protocol,c2c-paka protocol,server compromise attack,cross-realm setting,key agreement,ec2c-paka protocol,discrete logarithm,servers,dictionaries,erbium,key exchange,protocols,authenticated encryption,cryptographic protocols,encryption,diffie hellman,modular exponentiation,key agreement protocol,computer network security,authentication
Two-phase commit protocol,Cryptographic protocol,Interlock protocol,Oakley protocol,Computer security,Computer science,Computer network,Otway–Rees protocol,Authentication protocol,Key-agreement protocol,Universal composability
Conference
Citations 
PageRank 
References 
0
0.34
5
Authors
4
Name
Order
Citations
PageRank
Jing-feng Li100.34
Wei-feng Guo200.34
Lai-shun Zhang300.34
Yunpeng Li457845.91