Secure and efficient password-based authenticated key exchange protocol for two-server architecture

Ho Lee Jun, Hoon Lee Dong

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)

    Abstract

    A great part of protocols for password-based authenticated key exchange system are designed for a single-server environment where all the information about legitimate users is stored in one server. Therefore, a credential weakness is existed in this approach because the user's password is exposed if this server is ever compromised. In 2006, Yang et al. proposed a practical two-server authenticated key exchange system which split user's password into two and store them into the servers respectively. They also extended the basic two-server model to an architecture in which multiple service servers were supported by single control server, but they didn 't demonstrate an adequate protocol in the extended model. In this paper, we present a protocol which is suitable for the extended model. In addition, we describe that our proposed protocol is robust against various known attacks and has a user-friendness.

    Original languageEnglish
    Title of host publication2007 International Conference on Convergence Information Technology, ICCIT 2007
    Pages2102-2107
    Number of pages6
    DOIs
    Publication statusPublished - 2007
    Event2nd International Conference on Convergent Information Technology, ICCIT 07 - Gyongju, Korea, Republic of
    Duration: 2007 Nov 212007 Nov 23

    Publication series

    Name2007 International Conference on Convergence Information Technology, ICCIT 2007

    Other

    Other2nd International Conference on Convergent Information Technology, ICCIT 07
    Country/TerritoryKorea, Republic of
    CityGyongju
    Period07/11/2107/11/23

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Communication
    • Information Systems and Management

    Fingerprint

    Dive into the research topics of 'Secure and efficient password-based authenticated key exchange protocol for two-server architecture'. Together they form a unique fingerprint.

    Cite this