An efficient password-only two-server authenticated key exchange system

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

16 Scopus Citations
View graph of relations

Author(s)

  • Haimin Jin
  • Duncan S. Wong
  • Yinlong Xu

Related Research Unit(s)

Detail(s)

Original languageEnglish
Title of host publicationInformation and Communications Security
Subtitle of host publication9th International Conference, ICICS 2007, Proceedings
PublisherSpringer Verlag
Pages44-56
Volume4861 LNCS
ISBN (print)9783540770473
Publication statusPublished - 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4861 LNCS
ISSN (Print)0302-9743
ISSN (electronic)1611-3349

Conference

Title9th International Conference on Information and Communications Security, ICICS 2007
PlaceChina
CityZhengzhou
Period12 - 15 December 2007

Abstract

One of the prominent advantages of password-only two-server authenticated key exchange is that the user password will remain secure against offline dictionary attacks even after one of the servers has been compromised. The first system of this type was proposed by Yang, Deng and Bao in 2006. The system is efficient with a total of eight communication rounds in one protocol run. However, the security assumptions are strong. It assumes that one particular server cannot be compromised by an active adversary. It also assumes that there exists a secure communication channel between the two servers. Recently, a new protocol has been proposed by the same group of researchers. The new one removes these assumptions, but in return pays a very high price on the communication overhead. It takes altogether ten rounds to complete one protocol run and requires more computation. Therefore, the question remains is whether it is possible to build a protocol which can significantly reduce the number of communication rounds without introducing additional security assumptions or computational complexity. In this paper, we give an affirmative answer by proposing a very efficient protocol with no additional assumption introduced. The protocol requires only six communication rounds without increasing the computational complexity. © Springer-Verlag Berlin Heidelberg 2007.

Citation Format(s)

An efficient password-only two-server authenticated key exchange system. / Jin, Haimin; Wong, Duncan S.; Xu, Yinlong.
Information and Communications Security: 9th International Conference, ICICS 2007, Proceedings. Vol. 4861 LNCS Springer Verlag, 2007. p. 44-56 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4861 LNCS).

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review