<b>Security analysis and enhancements of a three-party authenticated key agreement protocol

Authors

  • Zhiheng Wang Henan Polytechnic University
  • Zhanqiang Huo Henan Polytechnic University
  • Wenbo Shi Northeastern University at Qinhuangdao

DOI:

https://doi.org/10.4025/actascitechnol.v37i3.25240

Keywords:

authenticated key agreement, three-party, provable security.

Abstract

Three-party authenticated key agreement (3PAKA) protocol is an important cryptographic mechanism for secure communication, which allows two clients to generate a shared session key with the help of the server. Recently, Tan proposed a communication and computation-efficient 3PAKA protocol. Compared with related protocols, Tan´s protocol requires fewer rounds, lower communication cost and smaller computation cost. Tan claimed that his protocol was secure against various attacks. Unfortunately, we found that his protocol cannot withstand the key compromise impersonation attack. To improve security, we proposed a new 3PAKA protocol. Security analysis and performance analysis show our 3PAKA protocol could overcome weakness in Tan´s protocol at the cost of increasing the computational cost slightly.

 

Downloads

Download data is not yet available.

Author Biography

Zhiheng Wang, Henan Polytechnic University

SchoolofComputerScience and Technique,HenanPolytechnicUniversity,Jiaozuo,China

Downloads

Published

2015-07-01

How to Cite

Wang, Z., Huo, Z., & Shi, W. (2015). <b>Security analysis and enhancements of a three-party authenticated key agreement protocol. Acta Scientiarum. Technology, 37(3), 329–336. https://doi.org/10.4025/actascitechnol.v37i3.25240

Issue

Section

Computer Science

 

0.8
2019CiteScore
 
 
36th percentile
Powered by  Scopus

 

 

0.8
2019CiteScore
 
 
36th percentile
Powered by  Scopus