1 / 14

Provably Efficient Authenticated Key Agreement Protocol For Multi-Servers

Provably Efficient Authenticated Key Agreement Protocol For Multi-Servers. Authors: REN-JUNN HWANG AND SHENG-HUA SHIAU Source: The Computer Journal, Vol. 50 No. 5, pp. 602-614, 2007. Outline. Introduction The proposed scheme Analysis Comparisons Conclusions Comments. Introduction.

ingrid
Download Presentation

Provably Efficient Authenticated Key Agreement Protocol For Multi-Servers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Provably Efficient Authenticated Key Agreement Protocol For Multi-Servers Authors: REN-JUNN HWANG AND SHENG-HUA SHIAU Source: The Computer Journal, Vol. 50 No. 5, pp. 602-614, 2007

  2. Outline • Introduction • The proposed scheme • Analysis • Comparisons • Conclusions • Comments

  3. Introduction • Authenticated Key Agreement • User authentication and key agreement scheme • Authentication scheme • Single server Multi-server

  4. The proposed scheme • 3 roles: • Users • Servers • Trusted management server • 3 phases: • The registration phase • The login phase • The password change phase

  5. Notations

  6. The Registration Phase Server Sj Trusted management server Secret key Secret key User Ui Smart card Server Sj

  7. The password change phase

  8. Analysis • Random oracle model • BAN logic • Replay attack • Unknown key share attack • Stolen verifier attack • Insider attack • Mutual authentication • Explicit key authentication

  9. Comparisons~ security properties

  10. Comparisons~ computational cost

  11. Conclusions • An efficient AKE protocol for multi servers • Not only provides mutual authentication but also establishes a common session key

  12. Comments • Each server should maintain a user table. • Lack of Forward Secrecy • If wi,j is compromised • D-H key agreement • Lij? b?

More Related