The efficient 3-pass password-based key exchange protocol with low computational cost for client

Hyoungkyu Lee, Kiwook Sohn, Hyoungkyu Yang, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

We propose the efficient password-based key exchange protocol, which resists against dictionary attack mounted by a passive or active adversary and is a 3-pass key exchange protocol, whereas existing protocols are 4-pass or more. Thus, considering network traffic, it will be able to reduce the total execution time in comparison with other several schemes. Especially, from the view point of the client’s computational cost, our protocol is suitable for mobile communications. It is because we can reduce the modular exponentiation of client (or mobile) in comparison with other several password-based protocols. Besides, the proposed scheme has the characteristics of perfect forward secrecy, and resists against a known key attack. It also offers resistance against a stolen verifier attack as A-EKE, B-SPEKE, and SRP. Finally, two parties involved in protocol are able to agree on Diffie-Hellman exponential gxy in the proposed scheme.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings
EditorsJooSeok Song
PublisherSpringer Verlag
Pages147-155
Number of pages9
ISBN (Print)3540673806, 9783540673804
DOIs
StatePublished - 2000
Event2nd International Conference on Information Security and Cryptology, ICISC 1999 - Seoul, Korea, Republic of
Duration: 9 Dec 199910 Dec 1999

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1787
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Conference on Information Security and Cryptology, ICISC 1999
Country/TerritoryKorea, Republic of
CitySeoul
Period9/12/9910/12/99

Fingerprint

Dive into the research topics of 'The efficient 3-pass password-based key exchange protocol with low computational cost for client'. Together they form a unique fingerprint.

Cite this