A New Three-party Key Exchange Protocol Based on Diffie-Hellman

Full Text (PDF, 165KB), PP.65-69

Views: 0 Downloads: 0

Author(s)

Chunling Liu 1,* Yufeng Wang 1 Qinxi Bai 1

1. Ludong University, Yantai, Shandong, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2011.04.09

Received: 21 Apr. 2011 / Revised: 2 Jun. 2011 / Accepted: 29 Jun. 2011 / Published: 15 Aug. 2011

Index Terms

Diffie-Hellman, Three-party Key Exchange, DLP

Abstract

The goal of key exchange protocol is to establish a common and secure session key using the interactive communications. The existing schemes are usually in the pattern of ‘user-server-user’, so are weak in reality. In this paper, a new three-party key exchange protocol based on Diffie-Hellman was proposed which contains the following characteristics: without server; providing key secrecy and forward secrecy; ensuring no key control; ensuring known-key secrecy.

Cite This Paper

Chunling Liu, Yufeng Wang, Qinxi Bai,"A New Three-party Key Exchange Protocol Based on Diffie-Hellman", IJWMT, vol.1, no.4, pp.65-69, 2011. DOI: 10.5815/ijwmt.2011.04.09

Reference

[1] Wade Trappe and L. C. Washington, Cryptography and coding theory(in chinese),Beijing: Posts & Telecom Press, 2008.

[2] Yong-jun Ren , Jian-dong Wang, YiZhuang, Enhanced Identity-Based Authenticated Key Agreement Protocols in the Standard Model(in chinese), Journal of Electronics & Information Technology, 2009, vol.31,no.8, pp.1990-1995.

[3] W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 1976, vol.22.no.9,pp.644-654.

[4] Wenbo Mao,Modern Cryptography: Theory and Practice(in chinese),Beijing: Publishing house of Electronic Industry, 2004.

[5] W M Li, QY Wen, H Zhang,Verifier-based password-authenticated key exchange protocol for three-party (in chinese) ,Journal on Communications, 2008, vol.29,no.10,pp.149-152, 164.

[6] H M Sun, B C Chen, T Hwang,Secure key agreement protocols for three-party against guessing attacks,The Journal of Systems and Software, 2005, vol.75,no.1/2,pp.63-68.

[7] Alfred J. Menezes, Paul C. van Oorschot, Handbook of Applied Cryptography (in chinese),Beijing: Publishing house of Electronic Industry, 2005.

[8] L. Washington,Elliptic Curves: Number Theory and Cryptography, Chapman & Hall/CRC Press, 2003.