Password-based independent authentication and key exchange protocol

Kyoung Sook Jung, Ji Young Kim, Tae Choong Chung

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

This paper proposes a password-based authentication protocol suitable to certification through trustless network or key exchange. While the existing password-base protocols certify users through certification authority (CA) between client and server, the proposed protocol in this paper, users and server exchange keys and perform authentication without help of CA. To ameliorate the drawback of password-based protocols causing by the short length and randomness of password, the proposed protocol uses the signature techniques of ECDSA and the SRP protocol based on Diffie-Hellman key exchange method.

Original languageEnglish
Title of host publicationICICS-PCM 2003 - Proceedings of the 2003 Joint Conference of the 4th International Conference on Information, Communications and Signal Processing and 4th Pacific-Rim Conference on Multimedia
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1908-1912
Number of pages5
ISBN (Electronic)0780381858, 9780780381858
DOIs
Publication statusPublished - 2003
EventJoint Conference of the 4th International Conference on Information, Communications and Signal Processing and 4th Pacific-Rim Conference on Multimedia, ICICS-PCM 2003 - Singapore, Singapore
Duration: 15 Dec 200318 Dec 2003

Publication series

NameICICS-PCM 2003 - Proceedings of the 2003 Joint Conference of the 4th International Conference on Information, Communications and Signal Processing and 4th Pacific-Rim Conference on Multimedia
Volume3

Conference

ConferenceJoint Conference of the 4th International Conference on Information, Communications and Signal Processing and 4th Pacific-Rim Conference on Multimedia, ICICS-PCM 2003
Country/TerritorySingapore
CitySingapore
Period15/12/0318/12/03

Keywords

  • Authentication
  • ECDSA
  • Key exchange

Fingerprint

Dive into the research topics of 'Password-based independent authentication and key exchange protocol'. Together they form a unique fingerprint.

Cite this