Provably Secure and Password-Authenticated Hybrid Key Agreement Protocol in Two-realm with Privacy-Protection

This paper presents a password-authenticated hybrid key agreement protocol (PAHKAP) with privacy-privacy to guard security for internet era, which can combine classical cryptography (Chaos Cryptography) and quantum cryptography in a universal way for the most common environment nowadays: Password with two users in two realms. Compared with the former research AQKDPs (authenticated quantum key distribution protocols), PAHKAP have five merits: (1) the basis is dynamic against the long shared key revealed, (2) key agreement replaces key distribution for eliminating the servers to get the session key of the two users, (3) the servers need not store the shared key with all the users, and the server only need keep its long secret key secret for saving storage space and avoiding verification table leakage, (4) any user need not store the shared key with the server, and s/he only keep the password in her/his brain, (5) the scheme can achieve privacy preserving for outsiders. Moreover, the two-realm architecture can permit any two users to negotiate a fresh session key even if they have registered at the different server. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the comparison with the related works.

[1]  Tzonelih Hwang,et al.  Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols , 2007, IEEE Transactions on Dependable and Secure Computing.

[2]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[3]  Dong Hoon Lee,et al.  Password-Authenticated Key Exchange between Clients with Different Passwords , 2002, ICICS.

[4]  Mihir Bellare,et al.  Provably secure session key distribution: the three party case , 1995, STOC '95.

[5]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[6]  J. Schwinger UNITARY OPERATOR BASES. , 1960, Proceedings of the National Academy of Sciences of the United States of America.

[7]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[8]  Guihua Zeng,et al.  Identity verification in quantum key distribution , 2000 .

[9]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[10]  Sk Hafizul Islam,et al.  Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps , 2014 .

[11]  Xu Chen A(3,3) visual cryptography scheme for authentication , 2013 .

[12]  Li Gong,et al.  Efficient network authentication protocols: Lower bounds and optimal implementations , 1995, Distributed Computing.

[13]  Yuqing Zhang,et al.  Cryptanalysis of a client-to-client password-authenticated key agreement protocol , 2008, IACR Cryptol. ePrint Arch..

[14]  Hongfeng Zhu,et al.  Flexible and Password-Authenticated Key Agreement Scheme Based on Chaotic Maps for Multiple Servers to Server Architecture , 2015, Wirel. Pers. Commun..

[15]  D. J. Guan,et al.  A practical protocol for three-party authenticated quantum key distribution , 2014, Quantum Information Processing.

[16]  ZhuHongfeng Flexible and Password-Authenticated Key Agreement Scheme Based on Chaotic Maps for Multiple Servers to Server Architecture , 2015 .

[17]  Dongho Won,et al.  Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords , 2004, ICCSA.

[18]  Dong Hoon Lee,et al.  EC2C-PAKA: An efficient client-to-client password-authenticated key agreement , 2007, Inf. Sci..

[19]  Chien-Ming Chen,et al.  On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol , 2016, J. Netw. Intell..