Identity Based (ID2S) Authenticated Exchange Protocols

Authors(2) :-Seelam Sowjanya, Dr. P. G.V. Suresh Kumar

In the two-server a key password-authenticated exchange (PAKE) protocol, a sender divides its password and stores into two shares of its association in the two servers, individually, and the two servers then progressing to authenticate the client without memorising the password of the client. And In case one server is distrusted by an opponent, the password of the user is asked to endure strong. The author introduces two compilers that transform any two-party PAKE protocol to a two-server PAKE protocol by the identity-based cryptography, called ID2S PAKE protocol. By the compilers, we can assemble ID2S PAKE protocols which achieve understood authentication. As long as the underlying two-party PAKE protocol and identity-based encryption or signature system have provable protection without casual oracles, the ID2S PAKE protocols constructed by the compilers can be proven to be secure without random oracles. Associated with the Katz et al.'s two-server PAKE protocol with provable security without random oracles, our ID2S PAKE protocol can save from 22% to 66% of computation in each server.

Authors and Affiliations

Seelam Sowjanya
Assistant Professor, Department of Computer Science and Information Technology, Defense University College of Engineering, Bishoftu, Ethiopia, India
Dr. P. G.V. Suresh Kumar
Professor, Department of Computer Science and Information Technology, Yombo university, Waliso, Ethiopia, India

Password-authenticated key exchange, identity-based encryption and signature, Diffie-Hellman key exchange, decisional Diffie-Hellman problem

  1. M. Abdalla, P. A. Fouque, and D. Pointcheval. Password-based authenticated key exchange in the three-party setting. In Proc. PKC’05, pages 65-84, 2005.
  5. M. Abdalla and D. Pointcheval. Simple password-based encrypted key exchange protocols. In Proc. CT-RSA 2005, pages 191-208, 2005.
  6. M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Proc. Eurocrypt’00, pages 139-155, 2000.
  7. S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocol secure against the dictionary attack. In Proc. 1992 IEEE Symposium on Research in Security and Privacy, pages 72-84, 1992.
  8. J. Bender, M. Fischlin, and D. Kugler. Security analysis of the PACE key-agreement protocol. In Proc. ISC’09, pages 33-48, 2009.
  9. J. Bender, M. Fischlin, and D. Kugler. The PACE|CA protocol for machine-readable travel documents. In INTRUST’13, pages 17-35, 2013.
  10. D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Proc. Crypto'01, pages 213-229, 2001.
  11. V. Boyko, P. Mackenzie, and S. Patel. Provably secure password authenticated key exchange using Diffie-Hellman. In Proc. Euro- crypt’00, pages 156-171, 2000.
  12. J. Brainard, A. Juels, B. Kaliski, and M. Szydlo. Nightingale: A new two-server approach for authentication with short secrets. In Proc.12th USENIX Security Symp., pages 201-213, 2003.

Publication Details

Published in : Volume 4 | Issue 7 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 79-84
Manuscript Number : IJSRST1845198
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Seelam Sowjanya, Dr. P. G.V. Suresh Kumar, " Identity Based (ID2S) Authenticated Exchange Protocols", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 4, Issue 7, pp.79-84, March-April-2018.
Journal URL :

Article Preview