<b>Security analysis and enhancements of a three-party authenticated key agreement protocol
Three-party authenticated key agreement (3PAKA) protocol is an important cryptographic mechanism for secure communication, which allows two clients to generate a shared session key with the help of the server. Recently, Tan proposed a communication and computation-efficient 3PAKA protocol. Compared...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Universidade Estadual de Maringá
2015-07-01
|
Series: | Acta Scientiarum: Technology |
Subjects: | |
Online Access: | http://186.233.154.254/ojs/index.php/ActaSciTechnol/article/view/25240 |
id |
doaj-5958f528020647509c45705a8ab327c4 |
---|---|
record_format |
Article |
spelling |
doaj-5958f528020647509c45705a8ab327c42020-11-25T01:48:51ZengUniversidade Estadual de MaringáActa Scientiarum: Technology1806-25631807-86642015-07-0137332933610.4025/actascitechnol.v37i3.2524012480<b>Security analysis and enhancements of a three-party authenticated key agreement protocolZhiheng Wang0Zhanqiang Huo1Wenbo Shi2Henan Polytechnic UniversityHenan Polytechnic UniversityNortheastern University at QinhuangdaoThree-party authenticated key agreement (3PAKA) protocol is an important cryptographic mechanism for secure communication, which allows two clients to generate a shared session key with the help of the server. Recently, Tan proposed a communication and computation-efficient 3PAKA protocol. Compared with related protocols, Tan’s protocol requires fewer rounds, lower communication cost and smaller computation cost. Tan claimed that his protocol was secure against various attacks. Unfortunately, we found that his protocol cannot withstand the key compromise impersonation attack. To improve security, we proposed a new 3PAKA protocol. Security analysis and performance analysis show our 3PAKA protocol could overcome weakness in Tan’s protocol at the cost of increasing the computational cost slightly.http://186.233.154.254/ojs/index.php/ActaSciTechnol/article/view/25240authenticated key agreementthree-partyprovable security. |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Zhiheng Wang Zhanqiang Huo Wenbo Shi |
spellingShingle |
Zhiheng Wang Zhanqiang Huo Wenbo Shi <b>Security analysis and enhancements of a three-party authenticated key agreement protocol Acta Scientiarum: Technology authenticated key agreement three-party provable security. |
author_facet |
Zhiheng Wang Zhanqiang Huo Wenbo Shi |
author_sort |
Zhiheng Wang |
title |
<b>Security analysis and enhancements of a three-party authenticated key agreement protocol |
title_short |
<b>Security analysis and enhancements of a three-party authenticated key agreement protocol |
title_full |
<b>Security analysis and enhancements of a three-party authenticated key agreement protocol |
title_fullStr |
<b>Security analysis and enhancements of a three-party authenticated key agreement protocol |
title_full_unstemmed |
<b>Security analysis and enhancements of a three-party authenticated key agreement protocol |
title_sort |
<b>security analysis and enhancements of a three-party authenticated key agreement protocol |
publisher |
Universidade Estadual de Maringá |
series |
Acta Scientiarum: Technology |
issn |
1806-2563 1807-8664 |
publishDate |
2015-07-01 |
description |
Three-party authenticated key agreement (3PAKA) protocol is an important cryptographic mechanism for secure communication, which allows two clients to generate a shared session key with the help of the server. Recently, Tan proposed a communication and computation-efficient 3PAKA protocol. Compared with related protocols, Tan’s protocol requires fewer rounds, lower communication cost and smaller computation cost. Tan claimed that his protocol was secure against various attacks. Unfortunately, we found that his protocol cannot withstand the key compromise impersonation attack. To improve security, we proposed a new 3PAKA protocol. Security analysis and performance analysis show our 3PAKA protocol could overcome weakness in Tan’s protocol at the cost of increasing the computational cost slightly. |
topic |
authenticated key agreement three-party provable security. |
url |
http://186.233.154.254/ojs/index.php/ActaSciTechnol/article/view/25240 |
work_keys_str_mv |
AT zhihengwang bsecurityanalysisandenhancementsofathreepartyauthenticatedkeyagreementprotocol AT zhanqianghuo bsecurityanalysisandenhancementsofathreepartyauthenticatedkeyagreementprotocol AT wenboshi bsecurityanalysisandenhancementsofathreepartyauthenticatedkeyagreementprotocol |
_version_ |
1725009737359032320 |