Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting

  • Authors:
  • Weijia Wang;Lei Hu;Yong Li

  • Affiliations:
  • School of Science, Beijing Jiaotong University, Beijing, P.R. China 100044 and State Key Laboratory of Information Security, (Graduate University of Chinese Academy of Sciences), Beijing, P.R. Chi ...;State Key Laboratory of Information Security, (Graduate University of Chinese Academy of Sciences), Beijing, P.R. China 100049;School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, P.R. China 100044 and State Key Laboratory of Information Security, (Graduate University of Chinese Academy ...

  • Venue:
  • Information Security and Cryptology
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Until now, it is still an open problem to provide a provably secure and efficient protocol for treating the case in which ncommunication parties can authenticate each other and establish a secure session key with their respective passwords shared with a trusted server. Accordingly, in this paper we propose a solution in a formal way. Firstly, we review the strengthened EKE-M protocol--a maiden attempt to resolve the setting above and point out a subtle flaw in it that may cause unknown key sharing attacks. Next, based on previous work in the adversary model for key establishment protocols, we provide an extended one for the N-party setting. Finally, we propose a constant-round and provably secure generic construction of N-party different password-authentication (DPWA) key exchange protocols in the multicast setting.