
Mathematical Biosciences and Engineering, 2019, 16(5): 36233640. doi: 10.3934/mbe.2019180
Research article Special Issues
Export file:
Format
 RIS(for EndNote,Reference Manager,ProCite)
 BibTex
 Text
Content
 Citation Only
 Citation and Abstract
Verifierbased anonymous passwordauthenticated key exchange protocol in the standard model
1
State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan
450001, China
2
Department of Statistics, Chaudhary Charan Singh University, Meerut 250004, India
3
Department of Mathematics, Chaudhary Charan Singh University, Meerut 250004, India
4
Science and Technology on Information Assurance Laboratory, Beijing 100072, China
5
Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of
Electronic Technology, Guilin, Guangxi 541004, China
Received: , Accepted: , Published:
Special Issues: Security and Privacy in Smart Computing
References
1. D. Wang, H. Cheng, P. Wang, et al., Zipf's law in passwords. IEEE T. Inf. Foren. Sec., 12 (2017), 2776–2791.
2. S. M. Bellovin and M. Merritt, Encrypted key exchange: Passwordbased protocols secure against dictionary attacks, in Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, IEEE, (1992), 72–84.
3. E. Bresson, O. Chevassut and D. Pointcheval, Security proofs for an efficient passwordbased key exchange, in Proceedings of ACM CCS 2003, ACM Press, (2003), 241–250.
4. M. Abdalla and D. Pointcheval, Simple passwordbased encrypted key exchange protocols, in Proceedings of CTRSA 2005, Springer, (2005), 191–208.
5. J. Katz, R. Ostrovsky and M. Yung, Efficient passwordauthenticated key exchange using human memorable passwords, in Proceedings of EUROCRYPT 2001, Springer, (2001), 475–494.
6. F. Benhamouda, O. Blazy, C. Chevalier, et al., New techniques for SPHFs and efficient oneround PAKE protocols, in Proceedings of CRYPTO 2013, Springer, (2013), 449–475.
7. X. Yi, F. Y. Rao, Z. Tari, et al., ID2S passwordauthenticated key exchange protocols, IEEE T. Comput., 65 (2016), 3687–3701.
8. Y. Zhang, Y. Xiang, W. Wu, et al., A variant of password authenticated key exchange protocol, Future Gener. Comput. Sy., 78 (2018), 699–711.
9. Z. Li and D. Wang, Tworound PAKE protocol over lattices without NIZK, in Proceedings of ICISC 2018, Springer, (2018), 138–159.
10. M. Abdalla, P. A. Fouque and D. Pointcheval, Passwordbased authenticated key exchange in the threeparty setting, in Proceedings of PKC 2005, Springer, (2005), 65–84.
11. F. Wei, N. Kumar, D. He, et al., A general compiler for passwordauthenticated group key exchange protocol in the standard model, Discrete Appl. Math., 241 (2018), 78–86.
12. M. Bellare, D. Pointcheval and P. Rogaway, Authenticated key exchange secure against dictionary attacks, in Proceedings of EUROCRYPT 2000, Springer, (2000), 139–155.
13. R. Canetti, S. Halevi, J. Katz, et al., Universally composable passwordbased key exchange, in Proceedings of EUROCRYPT 2005, Springer, (2005), 404–421.
14. D. Q. Viet, A. Yamamura and H. Tanaka, Anonymous passwordbased authenticated key exchange, in Proceedings of INDOCRYPT 2005, Springer, (2005), 244–257.
15. J. Yang and Z. Zhang, A new anonymous passwordbased authenticated key exchange protocol, in Proceedings of INDOCRYPT 2008, Springer, (2008), 200–212.
16. S. H. Shin, K. Kobar and H. Imai, Veryefficient anonymous passwordauthenticated key exchange and its extensions, in Proceedings of AAECC 2009, Springer, (2009), 149–158.
17. X. Hu, J. Zhan, Z. Zhang, et al., Anonymous Password Authenticated Key Exchange Protocol in the Standard Model, Wirel. Pers. Commun., 96 (2017), 1451–1474.
18. Y. Yang, J. Zhou, J. Weng, et al., A new approach for anonymous password authentication, in Proceedings of ACSAC 09, IEEE, (2009), 199–208.
19. S. H. Shin and K. Kobara, Simple anonymous passwordbased authenticated key exchange (SAPAKE), reconsidered, IEICE T. Fundam. Electron. Commun. Comput. Sci., 100 (2017), 639–652.
20. Z. Zhang, K. Yang, X. Hu, et al., Practical anonymous password authentication and TLS with anonymous client authentication, in Proceedings of ACM CCS 2016, ACM Press, (2016), 1179–1191.
21. Information technologySecurity techniquesAnonymous entity authenticationPart 4: Mechanisms based on weak secrets, ISO/IEC standard 200094, 2017. Available from: https:// www. iso. org/ standard/64288.html.
22. K. Thomas, F. Li, A. Zand, et al., Data breaches, phishing, or malware? Understanding the risks of stolen credentials, in Proceedings of ACM CCS 2017, ACM Press, (2017), 1421–1434.
23. J. Li, L. Stecker, E. Zeigler, et al., Scramble the password before you type it, in Proceedings of World Conference on Information Systems and Technologies, Springer, (2018), 1097–1107.
24. Facebook Security Breach Exposes Accounts of 50 Million Users, 2018. Available from: https://www.nytimes.com/ 2018/09/28/ technology/facebookhackdatabreach.html.
25. F. Benhamouda and D. Pointcheval, Verifierbased passwordauthenticated key exchange: new models and constructions. IACR Crypt. ePrint Archive, 2013: 833.
26. D. Pointcheval and G. Wang, VTBPEKE: verifierbased twobasis password exponential key exchange, in Proceedings of Asia CCS 2017, ACM Press, (2017), 301–312.v 27. X. Yang, H. Jiang, Q. Xu, et al., A provablysecure and efficient verifierbased anonymous passwordauthenticated key exchange protocol, in Proceedings of Trustcom/BigDataSE/ISPA, 2016, IEEE, (2016), 670–677.
28. C. M. Chen, G. J. Wang, W. C. Fang, et al., A new verifierbased anonymous password authenticated key exchange protocol, J. Info. Hiding Multimedia Signal Process., 9 (2018), 1595–1602.
29. D. Wang and P. Wang, Two birds with one stone: Twofactor authentication with security beyond conventional bound, IEEE T. Depend. Secure Comput., 15 (2018), 708–722.
30. F. Wei, P. Vijayakumar, Q. Jiang, et al., A mobile intelligent terminal based anonymous authenticated key exchange protocol for roaming service in global mobility networks, IEEE T. Sustain. Comput., 2018.
31. M. Abdalla, F. Benhamouda and D. Pointcheval, Publickey encryption indistinguishable under plaintextcheckable attacks, in Proceedings of PKC 2015, Springer, (2015), 332–352.
32. R. Cramer and V. Shoup, Universal hash proofs and a paradigm for adaptive chosen ciphertext secure publickey encryption, in Proceedings of EUROCRYPT 2002, Springer, (2002), 45–64.
33. R. Gennaro and Y. Lindell, A framework for passwordbased authenticated key exchange, in Proceedings of EUROCRYPT 2003, Springer, (2003), 524–543.
34. J. Katz and V. Vaikuntanatha, Roundoptimal passwordbased authenticated key exchange, in Proceedings of TCC 2011, Springer, (2011), 293–310.
35. M. Abdalla, F. Benhamouda and D. Pointcheval, Disjunctions for hash proof systems: New constructions and applications, in Proceedings of EUROCRYPT 2015, Springer, (2015), 69–100.
36. S. Even, O. Goldreich and S. Mical, Online/offline digital signatures, in Proceedings of CRYPTO 89, Springer, (1989), 263–275.
37. F. Kiefer and M. Manulis, Zeroknowledge password policy checks and verifierbased PAKE, in Proceedings of ESORICS 2014, Springer, (2014), 295–312.
38. A. Groce and J. Katz, A new framework for efficient passwordbased authenticated key exchange, in Proceedings of ACM CCS 2010, ACM Press, (2010), 516–525.
© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)