TY - GEN
T1 - The efficient 3-pass password-based key exchange protocol with low computational cost for client
AU - Lee, Hyoungkyu
AU - Sohn, Kiwook
AU - Yang, Hyoungkyu
AU - Won, Dongho
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2000.
PY - 2000
Y1 - 2000
N2 - We propose the efficient password-based key exchange protocol, which resists against dictionary attack mounted by a passive or active adversary and is a 3-pass key exchange protocol, whereas existing protocols are 4-pass or more. Thus, considering network traffic, it will be able to reduce the total execution time in comparison with other several schemes. Especially, from the view point of the client’s computational cost, our protocol is suitable for mobile communications. It is because we can reduce the modular exponentiation of client (or mobile) in comparison with other several password-based protocols. Besides, the proposed scheme has the characteristics of perfect forward secrecy, and resists against a known key attack. It also offers resistance against a stolen verifier attack as A-EKE, B-SPEKE, and SRP. Finally, two parties involved in protocol are able to agree on Diffie-Hellman exponential gxy in the proposed scheme.
AB - We propose the efficient password-based key exchange protocol, which resists against dictionary attack mounted by a passive or active adversary and is a 3-pass key exchange protocol, whereas existing protocols are 4-pass or more. Thus, considering network traffic, it will be able to reduce the total execution time in comparison with other several schemes. Especially, from the view point of the client’s computational cost, our protocol is suitable for mobile communications. It is because we can reduce the modular exponentiation of client (or mobile) in comparison with other several password-based protocols. Besides, the proposed scheme has the characteristics of perfect forward secrecy, and resists against a known key attack. It also offers resistance against a stolen verifier attack as A-EKE, B-SPEKE, and SRP. Finally, two parties involved in protocol are able to agree on Diffie-Hellman exponential gxy in the proposed scheme.
UR - http://www.scopus.com/inward/record.url?scp=84958772595&partnerID=8YFLogxK
U2 - 10.1007/10719994_12
DO - 10.1007/10719994_12
M3 - Conference contribution
AN - SCOPUS:84958772595
SN - 3540673806
SN - 9783540673804
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 147
EP - 155
BT - Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings
A2 - Song, JooSeok
PB - Springer Verlag
T2 - 2nd International Conference on Information Security and Cryptology, ICISC 1999
Y2 - 9 December 1999 through 10 December 1999
ER -