Until now, it is still an open problem to provide a provably secure and efficient protocol for treating the case in which n communication parties can authenticate each other and establish a secure session key with their respective passwords shared with a trusted server. Accordingly, in this paper we propose a solution in a formal way. Firstly, we review the strengthened EKE-M protocol-a maiden attempt to resolve the setting above and point out a subtle flaw in it that may cause unknown key sharing attacks. Next, based on previous work in the adversary model for key establishment protocols, we provide an extended one for the N-party setting. Finally, we propose a constant-round and provably secure generic construction of N-party different password-authentication (DPWA) key exchange protocols in the multicast setting. © 2008 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Wang, W., Hu, L., & Li, Y. (2008). Provably secure N-party authenticated key exchange in the multicast DPWA setting. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4990 LNCS, pp. 93–107). https://doi.org/10.1007/978-3-540-79499-8_9
Mendeley helps you to discover research relevant for your work.