Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2015, Vol. 9 Issue (1) : 157-169    https://doi.org/10.1007/s11704-014-4124-4
RESEARCH ARTICLE
Scalable protocol for cross-domain group password-based authenticated key exchange
Cong GUO,Zijian ZHANG(),Liehuang ZHU,Yu-an TAN,Zhen YANG
Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
 Download: PDF(487 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Cross-domain password-based authenticated key exchange (PAKE) protocols have been studied for many years. However, these protocols are mainly focusing on multi-participant within a single domain in an open network environment. This paper proposes a novel approach for designing a cross-domain group PAKE protocol, that primarily handles with the setting of multi-participant in the multidomain. Moreover, our protocol is proved secure against active adversary in the Real-or-Random (ROR) model. In our protocol, no interaction occurs between any two domain authentication servers. They are regarded as ephemeral certificate authorities (CAs) to certify key materials that participants might subsequently use to exchange and agree on group session key. We further justify the computational complexity and measure the average computation time of our protocol. To the best of our knowledge, this is the first work to analyze and discuss a provably secure multi-participant cross-domain group PAKE protocol.

Keywords cross-domain      password-based authenticated key exchange (PAKE)      group key exchange      Real-OrRandom (ROR) model      provable secure     
Corresponding Author(s): Zijian ZHANG   
Issue Date: 09 February 2015
 Cite this article:   
Liehuang ZHU,Cong GUO,Zijian ZHANG, et al. Scalable protocol for cross-domain group password-based authenticated key exchange[J]. Front. Comput. Sci., 2015, 9(1): 157-169.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-014-4124-4
https://academic.hep.com.cn/fcs/EN/Y2015/V9/I1/157
1 Nicanfar H, Leung V C M. Multilayer consensus ECC-based password authenticated key-exchange (MCEPAK) protocol for smart grid system. IEEE Transactions on Smart Grid, 2013, 4(1): 253-264
https://doi.org/10.1109/TSG.2012.2226252
2 Abdalla M, Fouque P A, Pointcheval D. Password-based authenticated key exchange in the three-party setting. In: Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography. 2005, 65-84
3 Lou D C, Huang H F. Efficient three-party password-based key exchange scheme. International Journal of Communication Systems 2011, 24(4): 504-512
https://doi.org/10.1002/dac.1172
4 Kwon J O, Jeong I R, Sakurai K, Lee D H. Password-authenticated multi-party key exchange with different passwords. In: Proceedings of the International Association for Cryptologic Research. 2006, 476-480
5 Wu S, Chen K, Zhu Y. Enhancements of a three-party password-based authenticated key exchange protocol. International Arab Journal of Information Technology, 2013, 10(3), 215-221
6 Chuangui M, Fushan W, Fengxiu G. Efficient client-to-client password authenticated key exchange based on RSA. In: Proceedings of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems. 2013, 233-238
7 Liang H, Hu J, Wu S. Re-attack on a three-party password-based authenticated key exchange protocol. Mathematical and Computer Modelling, 2013, 57(5): 1175-1183
https://doi.org/10.1016/j.mcm.2012.10.019
8 Zhao J, Gu D. Provably secure three-party password-based authenticated key exchange protocol. Information Sciences, 2012, 184(1): 310-323
https://doi.org/10.1016/j.ins.2011.07.015
9 Yuan W, Hu L, Li H, Chu J F. An efficient password-based group key exchange protocol using secret sharing. Applied Mathematics and Information Sciences, 2013, 7(1), 145-150
https://doi.org/10.12785/amis/070117
10 Katz J, Ostrovsky R, Yung M. Efficient password-authenticated key exchange using human-memorable passwords. Lecture Notes in Computer Science, 2001, 2045: 475-494
https://doi.org/10.1007/3-540-44987-6_29
11 Yang J H, Cao T J. Provably secure three-party password authenticated key exchange protocol in the standard model. Journal of Systems and Software, 2012, 85(2): 340-350
https://doi.org/10.1016/j.jss.2011.08.024
12 Zhang Z I, Zhu L H, Liao L J. Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings. Information Sciences, 2012, 209: 93-112
https://doi.org/10.1016/j.ins.2012.04.029
13 Zhang Z J, Zhu L H, Wang F, Liao L J. Computationally sound and effective symbolic analysis of group key exchange protocols. Chinese Journal of Computers, 2012, 35(4): 664-672 (in Chinese)
https://doi.org/10.3724/SP.J.1016.2012.00664
14 Byun J W, Jeong I R, Lee D H. Password-authenticated key exchange between clients with different passwords. Lecture Notes in Computer Science, 2002, 2513: 134-146
https://doi.org/10.1007/3-540-36159-6_12
15 Chen L, Lim H W, Yang G. Cross-domain password-based authenticated key exchange revisited. In: Proceedings of the 32nd IEEE International Conference on Computer Communications. 2013, 1052-1060
16 Burmester M, Desmedt Y. A secure and scalable group key exchange system. Information Processing Letters, 2005, 94(3): 137-143
https://doi.org/10.1016/j.ipl.2005.01.003
17 Katz J, Yung M. Scalable protocols for authenticated group key exchange. Journa<?Pub Caret?>l of Cryptology, 2007, 20(1): 85-113
https://doi.org/10.1007/s00145-006-0361-5
18 Shoup V. OAEP reconsidered. Journal of Cryptology, 2000, 239-259
[1] Supplementary Material Download
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed