ZHANG Gefei, FAN Dan, ZHANG Yuqing, LI Xiaowei. A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password[J]. Chinese Journal of Electronics, 2017, 26(2): 271-278. doi: 10.1049/cje.2016.06.017
Citation: ZHANG Gefei, FAN Dan, ZHANG Yuqing, LI Xiaowei. A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password[J]. Chinese Journal of Electronics, 2017, 26(2): 271-278. doi: 10.1049/cje.2016.06.017

A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password

doi: 10.1049/cje.2016.06.017
Funds:  This work is supported by the National Natural Science Foundation of China (No.61272481, No.61402434), China Post-doctoral Science Foundation Funded Project (No.2014M550085), and the Open Fund of State Key Laboratory of Information Security (No.2014-12).
More Information
  • Corresponding author: ZHANG Yuqing (corresponding author) was born in 1966. He received the B.S. and M.S. degrees in computer science from Xidian University, China, in 1987 and 1990 respectively. He received the Ph.D. degree in Cryptography from Xidian University in 2000. He is a professor and supervisor of Ph.D. candidates of University of Chinese Academy of Sciences. His research interests include cryptography, information security and network protocol security.(Email:zhangyq@ucas.ac.cn)
  • Received Date: 2015-02-11
  • Rev Recd Date: 2015-04-19
  • Publish Date: 2017-03-10
  • Key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a password. Most of these protocols are often limited to simple network systems, and they may have security risks. We propose a general construction for key exchange protocols using smart card and password to avoid these flaws. The constructed protocol from the general construction has only one additional communication round than the original public encryption scheme. This construction is proven secure under random oracle model, so it can resist several common types of attacks. It is also adapted well to various networks. Compared with related protocols, the proposed key exchange protocol generated from the general construction has better secure properties and good computational efficiency in storage cost and operation time.
  • loading
  • W. Diffie and M. Hellman, "New directions in cryptography", IEEE Transactions on Information Theory, Vol.22, No.6, pp.644-654, 1976.
    L. Law, A. Menezes, M. Qu, et al., "An efficient protocol for authenticated key agreement", Designs, Codes and Cryptography, Vol.28, No.2, pp.119-134, 2003.
    R. Gennaro, H. Krawczyk, T. Rabin, et al., "Revisited:Fully authenticated diffie-hellman with minimal overhead", Proceedings of Applied Cryptography and Network Security, Beijing, China, pp.309-328, 2010.
    J.G. Li, Z.W. Wang and Y.C. Zhang, "Provably secure certificate-based signature scheme without pairings", Information Sciences, Vol.233, No.6, pp.313-320, 2013.
    C.J. Wang, "A provable secure fuzzy identity based signature scheme", Science China F-Information Science, Vol.55, No.9, pp.2139-2148, 2012.
    M. Bellare, D. Pointcheval and P. Rogaway, "Authenticated key exchange secure against dictionary attacks", Proceedings of Eurocrypt, Brugge, Belgium, pp.139-155, 2000.
    M. Bellare and P. Rogaway, "The auth-a protocol for password-based authenticated key exchange", Contributions to IEEE P1363, Technical Report, IEEE, 2000.
    S. Bellovin and M. Merritt, "Encrypted key exchange:password-based protocols secure against dictionary attacks", Proceedings of IEEE Symposium, IEEE Security and Privacy, Oakland, California, USA, pp.72-84, 1992.
    D.G. Feng and W.D. Chen, "Security model and modular design of fair authentication key exchange protocols", Science China F-Information Science, Vol.53, No.2, pp.278-287, 2010.
    J.Z. Luo and M. Yang, "Analysis of security protocols based on challenge-response", Science China F-Information Science, Vol.50, No.2, pp.137-153, 2007.
    C. Wan, A. Hu and J. Zhang, "An elliptic curve based handoff authentication protocol for wlan", Chinese Journal of Electronics, Vol.39, No.1, pp.165-169, 2011.
    D.G. Feng and W.D. Chen, "Modular approach to the design and analysis of password-based security protocols", Science China F-Information Science, Vol.50, No.3, pp.381-398, 2007.
    M.S. Hwang and L.H. Li, "A new remote user authentication scheme using smart cards", IEEE Transactions on Consumer Electronics, Vol.46, No.1, pp.28-30, 2000.
    G.M. Yang, D.S. Wong, H.X. Wang, et al., "Two-factor mutual authentication based on smart cards and passwords", Journal of Computer and System Sciences, Vol.74, No.7, pp.1160-1172, 2008.
    W.S. Juang, S.T. Chen and H.T. Liaw, "Robust and efficient password authenticated key agreement using smart cards", IEEE Transaction on Industrial Electronics, Vol.55, No.6, pp.2551-2556, 2008.
    D.Z. Sun, J.P. Huai, J.Z Sun, et al., "Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards", IEEE Transaction on Industrial Electronics, Vol.56, No.6, pp.2284-2291, 2009.
    X.X. Li, W.D. Qiu, D. Zheng, et al.,"Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards", IEEE Transaction on Industrial Electronics, Vol.57, No.2, pp.793-800, 2010.
    X.W. Li and Y.Q. Zhang, "A simple and robust anonymous two-factor authenticated key exchange protocol", Security and Communication Networks, Vol.6, No.6, pp.711-722, 2013.
    X.W. Li, Y.Q. Zhang, G.F. Zhang, et al., "Strongly secure authenticated key agreement protocol using smart card", Acta Electronica Sinica, Vol.42, No.8, pp.1587-1593, 2014. (in Chinese)
    S.K. Sood, "Dynamic identity based authentication protocol for two-server architecture", Journal of Information Security, Vol.3, No.4, pp.326-334, 2012.
    Z.H. Cai, L.P. Zhang and S.Y. Tang, "Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol based communications", IET Communications, Vol.8, No.1, pp.83-91, 2014.
    L.P. Zhang, S.Y. Tang and Z.H. Cai, "Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card", International Journal of Communication Systems, Vol.27, No.11, pp.2691-2702, 2014.
    C. Jiang, W. Jia, K. Gu, et al., "Anonymous authentication without home server in mobile roaming networks", Chinese Journal of Electronics, Vol.22, No.2, pp.382-386, 2013.
    S. Halevi and H. Krawczyk, "Public-key cryptography and password protocols", Proceedings of ACM Conference on Computer and Communications Security, San Francisco, California, USA, pp.122-131, 1998.
    J. Xu, W.T. Zhu and D.G. Feng, "An improved smart card based password authentication scheme with provable security", Computer Standards and Interfaces, Vol.31, No.4, pp.723-730, 2009.
    R. Song, "Advanced smart card based password authentication protocol", Computer Standards and Interfaces, Vol.32, No.5, pp.321-325, 2010.
    D. Wang and C.G. Ma, "Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards", The Journal of China Universities of Posts and Telecommunications, Vol.19, No.5, pp.104-114, 2012.
    T. Okamoto and D. Pointcheval, "The gap-problems:A new class of problems for the security of cryptographic schemes", Proceedings of 4th International Workshop on Practice and Theory in Public Key Cryptography, Cheju Island, Korea, pp.104-118, 2001.
    A.R. Meijer, "Cryptology and the birthday paradox", The UMAP Journal, Vol.17, No.1, pp.71-84, 1996.
    M. Abdalla, M. Bellare and P. Rogaway, "The oracle diffie-hellman assumptions and an analysis of DHIES", The Cryptographers' Track at RSA Conference, San Francisco, California, USA, pp.143-158, 2001.
    M. Hwang, and I. Lin, "A simple micro-payment scheme", Journal of Systems and Software, Vol.55, No.3, pp.221-229, 2001.
    S.K. Hafizul, "Design and analysis of an improved smart card-based remote user password authentication scheme:Improved smart card-based remote user password authentication scheme", International Journal of Communication Systems, DOI:10.1002/dac.2793, 2014.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (159) PDF downloads(431) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return