CMQV+: an authenticated key exchange protocol from CMQV Ustaoglu presents a secure and efficient key exchange protocol named CMQV, based on the design rationales of HMQV and NAXOS. Compared with the latter two protocols, on the one hand, CMQV achieves higher performance than HMQV, and on the other, it is proven in the eCK model to be as secure as NAXOS. However, CMQV enjoys the security proof under gap Diffie-Hellman assumption as indicated by its creators. In this paper, we propose a variant of CMQV, called CMQV+, which is proven secure under a weaker assumption (i.e. computational Diffie-Hellman assumption) in the eCK model with random oracles while maintaining the high-performance feature of CMQV as much as possible.

References in zbMATH (referenced in 35 articles , 1 standard article )

Showing results 1 to 20 of 35.
Sorted by year (citations)

1 2 next

  1. Chen, Zhiya; Zhou, Kunlin; Liao, Qin: Quantum identity authentication scheme of vehicular ad-hoc networks (2019)
  2. Li, Chun-Ta; Chen, Chin-Ling; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Chien-Ming: A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps (2018)
  3. Liu, Chao-Liang; Tsai, Wang-Jui; Chang, Ting-Yi; Liu, Ta-Ming: Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments (2018)
  4. Parne, Balu L.; Gupta, Shubham; Chaudhari, Narendra S.: ESAP: efficient and secure authentication protocol for roaming user in mobile communication networks (2018)
  5. Wei, Fushan; Zhang, Ruijie; Ma, Chuangui: A provably secure anonymous two-factor authenticated key exchange protocol for cloud computing (2018)
  6. Alawatugoda, Janaka: On the leakage-resilient key exchange (2017)
  7. Jiang, Qi; Wei, Fushan; Fu, Shuai; Ma, Jianfeng; Li, Guangsong; Alelaiwi, Abdulhameed: Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy (2016)
  8. Amin, Ruhul; Biswas, G. P.: Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card (2015)
  9. Islam, SK Hafizul: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps (2015)
  10. Lee, Cheng-Chi; Li, Chun-Ta; Chiu, Shih-Ting; Lai, Yan-Ming: A new three-party-authenticated key agreement scheme based on chaotic maps without password table (2015)
  11. Lee, Tian-Fu; Lin, Ching-Ying; Lin, Chun-Li; Hwang, Tzonelih: Provably secure extended chaotic map-based three-party key agreement protocols using password authentication (2015)
  12. Li, Xiong; Niu, Jianwei; Kumari, Saru; Khan, Muhammad Khurram; Liao, Junguo; Liang, Wei: Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol (2015)
  13. Naik, R. Lalu; Reddy, P. Chenna: Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach (2015)
  14. Xie, Qi; Hu, Bin; Wu, Ting: Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server’s public key and smart card (2015)
  15. Farash, Mohammad Sabzinejad; Attari, Mahmoud Ahmadian: An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps (2014)
  16. Lai, Hong; Orgun, Mehmet A.; Xiao, Jinghua; Pieprzyk, Josef; Xue, Liyin; Yang, Yixian: Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model (2014)
  17. Tian, Youliang; Ma, Jianfeng; Peng, Changgen; Wang, Yichuan; Zhang, Liumei: A rational framework for secure communication (2013)
  18. Tsai, Hao-Chuan; Chang, Chin-Chen: Provably secure three party encrypted key exchange scheme with explicit authentication (2013)
  19. Xie, Qi; Zhao, Jianmin; Yu, Xiuyuan: Chaotic maps-based three-party password-authenticated key agreement scheme (2013)
  20. Xiong, Hu; Chen, Yanan; Guan, Zhi; Chen, Zhong: Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys (2013)

1 2 next