An efficient password-only two-server authenticated key exchange system
Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Author(s)
Related Research Unit(s)
Detail(s)
Original language | English |
---|---|
Title of host publication | Information and Communications Security |
Subtitle of host publication | 9th International Conference, ICICS 2007, Proceedings |
Publisher | Springer Verlag |
Pages | 44-56 |
Volume | 4861 LNCS |
ISBN (print) | 9783540770473 |
Publication status | Published - 2007 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 4861 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (electronic) | 1611-3349 |
Conference
Title | 9th International Conference on Information and Communications Security, ICICS 2007 |
---|---|
Place | China |
City | Zhengzhou |
Period | 12 - 15 December 2007 |
Link(s)
Abstract
One of the prominent advantages of password-only two-server authenticated key exchange is that the user password will remain secure against offline dictionary attacks even after one of the servers has been compromised. The first system of this type was proposed by Yang, Deng and Bao in 2006. The system is efficient with a total of eight communication rounds in one protocol run. However, the security assumptions are strong. It assumes that one particular server cannot be compromised by an active adversary. It also assumes that there exists a secure communication channel between the two servers. Recently, a new protocol has been proposed by the same group of researchers. The new one removes these assumptions, but in return pays a very high price on the communication overhead. It takes altogether ten rounds to complete one protocol run and requires more computation. Therefore, the question remains is whether it is possible to build a protocol which can significantly reduce the number of communication rounds without introducing additional security assumptions or computational complexity. In this paper, we give an affirmative answer by proposing a very efficient protocol with no additional assumption introduced. The protocol requires only six communication rounds without increasing the computational complexity. © Springer-Verlag Berlin Heidelberg 2007.
Citation Format(s)
An efficient password-only two-server authenticated key exchange system. / Jin, Haimin; Wong, Duncan S.; Xu, Yinlong.
Information and Communications Security: 9th International Conference, ICICS 2007, Proceedings. Vol. 4861 LNCS Springer Verlag, 2007. p. 44-56 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4861 LNCS).
Information and Communications Security: 9th International Conference, ICICS 2007, Proceedings. Vol. 4861 LNCS Springer Verlag, 2007. p. 44-56 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4861 LNCS).
Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review