A password-based authenticator: Security proof and applications

13Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A password-based authentication mechanism, first proposed by Halevi and Krawczyk, is used to formally describe a password-based authenticator in the Canetti-Krawczyk proof model. A proof of the security of the authenticator is provided. The possible practical applications of the authenticator are demonstrated by applying it to two key exchange protocols from the ideal world of the Canetti-Krawczyk model to produce two password-based key exchange protocols with provable security in the real world of the model. These two new protocols are almost as efficient as those proposed by Halevi and Krawczyk and have fewer message flows if it is assumed that the client must initiate the protocol. The new authenticator contributes a new component which has been proven secure in the Canetti-Krawczyk model, while the new key exchange protocols are provably secure making them attractive for use in settings where clients must authenticate to a server using a relatively short password. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Hitchcock, Y., Tin, Y. S. T., Gonzalez-Nieto, J. M., Boyd, C., & Montague, P. (2003). A password-based authenticator: Security proof and applications. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2904, 388–401. https://doi.org/10.1007/978-3-540-24582-7_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free