Paper Title:
Novel Verifier-Based Three-Party Protocol for Key Exchange and Authentication
  Abstract

The verifier-based key exchange protocol for three parties deals with the authenticated key agreement process between two clients with the help of a trusted server who have to store their verifiers in the server for authentication. Recently, Liu et al. proposed a key exchange protocol for three-party based on verifier authentication and claimed that their protocol could resist many familiar attacks. Unfortunately, we find out that the proposed protocol is insecure against off-line guessing attack and impersonation attack. In this paper, we conduct a detailed analysis on the flaws of Liu et al.’s protocol. In addition, a new protocol is presented with security analysis.

  Info
Periodical
Key Engineering Materials (Volumes 460-461)
Edited by
Yanwen Wu
Pages
231-236
DOI
10.4028/www.scientific.net/KEM.460-461.231
Citation
J. H. Yang, T. J. Cao, "Novel Verifier-Based Three-Party Protocol for Key Exchange and Authentication", Key Engineering Materials, Vols. 460-461, pp. 231-236, 2011
Online since
January 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Yung Cheng Lee
Abstract:The authenticated key agreement protocols are widely used mechanisms for users to negotiate session keys and authenticate each other. Until...
510
Authors: Yong Ning Guo, Cheng Lian Liu
Chapter 7: Computer Application in Design and Manufacturing (1)
Abstract:The Internet has been population, which it was implement information technology, to every enterprize, also changed their contact mode of...
3847
Authors: Ren Junn Hwang, Feng Fu Su, Loang Shing Huang
Chapter 7: Other Related Topics
Abstract:This paper proposes a three-party authenticated key exchange protocol using two-factor including a password and a token. The proposed...
2075
Authors: Xiao Jun Zhong, Lu Yao
Chapter 7: Computer and Information Technologies
Abstract:In this paper, we propose a publicly verifiable batch encryption scheme. It allows a trusted entity to verify that two or more cipher texts...
545
Authors: Li Guo, Gang Yao
Chapter 5: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development
Abstract:An authentication protocol is a procedure by which a sender tries to convey n bits of information, which we call an input message, to a...
2892