CMQV+: an authenticated key exchange protocol from CMQV Ustaoglu presents a secure and efficient key exchange protocol named CMQV, based on the design rationales of HMQV and NAXOS. Compared with the latter two protocols, on the one hand, CMQV achieves higher performance than HMQV, and on the other, it is proven in the eCK model to be as secure as NAXOS. However, CMQV enjoys the security proof under gap Diffie-Hellman assumption as indicated by its creators. In this paper, we propose a variant of CMQV, called CMQV+, which is proven secure under a weaker assumption (i.e. computational Diffie-Hellman assumption) in the eCK model with random oracles while maintaining the high-performance feature of CMQV as much as possible.

References in zbMATH (referenced in 27 articles , 1 standard article )

Showing results 1 to 20 of 27.
Sorted by year (citations)

1 2 next

  1. Alawatugoda, Janaka: On the leakage-resilient key exchange (2017)
  2. Jiang, Qi; Wei, Fushan; Fu, Shuai; Ma, Jianfeng; Li, Guangsong; Alelaiwi, Abdulhameed: Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy (2016)
  3. Lee, Cheng-Chi; Li, Chun-Ta; Chiu, Shih-Ting; Lai, Yan-Ming: A new three-party-authenticated key agreement scheme based on chaotic maps without password table (2015)
  4. Lee, Tian-Fu; Lin, Ching-Ying; Lin, Chun-Li; Hwang, Tzonelih: Provably secure extended chaotic map-based three-party key agreement protocols using password authentication (2015)
  5. Li, Xiong; Niu, Jianwei; Kumari, Saru; Khan, Muhammad Khurram; Liao, Junguo; Liang, Wei: Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol (2015)
  6. Naik, R.Lalu; Reddy, P.Chenna: Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach (2015)
  7. Xie, Qi; Hu, Bin; Wu, Ting: Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server’s public key and smart card (2015)
  8. Farash, Mohammad Sabzinejad; Attari, Mahmoud Ahmadian: An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps (2014)
  9. Lai, Hong; Orgun, Mehmet A.; Xiao, Jinghua; Pieprzyk, Josef; Xue, Liyin; Yang, Yixian: Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model (2014)
  10. Tian, Youliang; Ma, Jianfeng; Peng, Changgen; Wang, Yichuan; Zhang, Liumei: A rational framework for secure communication (2013)
  11. Tsai, Hao-Chuan; Chang, Chin-Chen: Provably secure three party encrypted key exchange scheme with explicit authentication (2013)
  12. Xie, Qi; Zhao, Jianmin; Yu, Xiuyuan: Chaotic maps-based three-party password-authenticated key agreement scheme (2013)
  13. Xiong, Hu; Chen, Yanan; Guan, Zhi; Chen, Zhong: Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys (2013)
  14. Chang, Ting-Yi: Dynamically generate a long-lived private key based on password keystroke features and neural network (2012) ioport
  15. Li, Hui; Wu, Chuankun: CMQV+: an authenticated key exchange protocol from CMQV (2012)
  16. Wu, Shuhua; Pu, Qiong; Wang, Shengbao; He, Debiao: Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol (2012)
  17. Zhao, Jianjie; Gu, Dawu: Provably secure three-party password-based authenticated key exchange protocol (2012)
  18. Zhao, Jianjie; Gu, Dawu; Li, Yali; Cheng, Wei: On weaknesses of the HDCP authentication and key exchange protocol and its repair (2012)
  19. Chang, Ting-Yi; Hwang, Min-Shiang; Yang, Wei-Pang: A communication-efficient three-party password authenticated key exchange protocol (2011) ioport
  20. Wei, Fushan; Ma, Chuangui; Zhang, Zhenfeng: Gateway-oriented password-authenticated key exchange protocol with stronger security (2011)

1 2 next