140 likes | 280 Views
Provably Efficient Authenticated Key Agreement Protocol For Multi-Servers. Authors: REN-JUNN HWANG AND SHENG-HUA SHIAU Source: The Computer Journal, Vol. 50 No. 5, pp. 602-614, 2007. Outline. Introduction The proposed scheme Analysis Comparisons Conclusions Comments. Introduction.
E N D
Provably Efficient Authenticated Key Agreement Protocol For Multi-Servers Authors: REN-JUNN HWANG AND SHENG-HUA SHIAU Source: The Computer Journal, Vol. 50 No. 5, pp. 602-614, 2007
Outline • Introduction • The proposed scheme • Analysis • Comparisons • Conclusions • Comments
Introduction • Authenticated Key Agreement • User authentication and key agreement scheme • Authentication scheme • Single server Multi-server
The proposed scheme • 3 roles: • Users • Servers • Trusted management server • 3 phases: • The registration phase • The login phase • The password change phase
The Registration Phase Server Sj Trusted management server Secret key Secret key User Ui Smart card Server Sj
Analysis • Random oracle model • BAN logic • Replay attack • Unknown key share attack • Stolen verifier attack • Insider attack • Mutual authentication • Explicit key authentication
Conclusions • An efficient AKE protocol for multi servers • Not only provides mutual authentication but also establishes a common session key
Comments • Each server should maintain a user table. • Lack of Forward Secrecy • If wi,j is compromised • D-H key agreement • Lij? b?