Provably secure N-party authenticated key exchange in the multicast DPWA setting

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Until now, it is still an open problem to provide a provably secure and efficient protocol for treating the case in which n communication parties can authenticate each other and establish a secure session key with their respective passwords shared with a trusted server. Accordingly, in this paper we propose a solution in a formal way. Firstly, we review the strengthened EKE-M protocol-a maiden attempt to resolve the setting above and point out a subtle flaw in it that may cause unknown key sharing attacks. Next, based on previous work in the adversary model for key establishment protocols, we provide an extended one for the N-party setting. Finally, we propose a constant-round and provably secure generic construction of N-party different password-authentication (DPWA) key exchange protocols in the multicast setting. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Wang, W., Hu, L., & Li, Y. (2008). Provably secure N-party authenticated key exchange in the multicast DPWA setting. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4990 LNCS, pp. 93–107). https://doi.org/10.1007/978-3-540-79499-8_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free