Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Password-Authenticated Key Exchange Based on RSA
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys
Proceedings of the 5th International Workshop on Security Protocols
The Performance Measurement of Cryptographic Primitives on Palm Devices
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Provably secure password-authenticated key exchange using Diffie-Hellman
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
An efficient authentication protocol for mobile satellite communication systems
ACM SIGOPS Operating Systems Review
Weakness in a RSA-based password authenticated key exchange protocol
Information Processing Letters
The design of e-traveler's check with efficiency and mutual authentication
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
RSA-Based Password-Authenticated Key Exchange, Revisited
IEICE - Transactions on Information and Systems
An efficient password authenticated key exchange protocol for imbalanced wireless networks
Computer Standards & Interfaces
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
Computationally-efficient password authenticated key exchange based on quadratic residues
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
A lower-bound of complexity for RSA-Based password-authenticated key exchange
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Efficient password-authenticated key exchange based on RSA
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Mutual authentication and group key agreement for low-power mobile devices
Computer Communications
Hi-index | 0.00 |
We consider an imbalanced wireless network setup in which a low-power client communicates with a powerful server. We assume that public key cryptographic operations such as Diffie-Hellman key exchange conducted over a large multiplicative group is too computationally intensive for a low-power client to implement. In this paper, we propose an authenticatedk ey exchange protocol such that it is efficient enough to be implemented on most of the target low-power devices such as devices in sensor networks, smart cards and low-power Personal Digital Assistants. In addition, it is secure against dictionary attacks. Our scheme requires less than 2.5 seconds of pure computation on a 16MHz Palm V andab out 1 secondfor data transmission if the throughput of a network is 8 kbps. The computation time can be improvedto 300 msec and the transmision time can also be reduced to 300 msec if caching is allowed.