CMQV+: an authenticated key exchange protocol from CMQV Ustaoglu presents a secure and efficient key exchange protocol named CMQV, based on the design rationales of HMQV and NAXOS. Compared with the latter two protocols, on the one hand, CMQV achieves higher performance than HMQV, and on the other, it is proven in the eCK model to be as secure as NAXOS. However, CMQV enjoys the security proof under gap Diffie-Hellman assumption as indicated by its creators. In this paper, we propose a variant of CMQV, called CMQV+, which is proven secure under a weaker assumption (i.e. computational Diffie-Hellman assumption) in the eCK model with random oracles while maintaining the high-performance feature of CMQV as much as possible.

References in zbMATH (referenced in 22 articles , 1 standard article )

Showing results 1 to 20 of 22.
Sorted by year (citations)

1 2 next

  1. Jiang, Qi; Wei, Fushan; Fu, Shuai; Ma, Jianfeng; Li, Guangsong; Alelaiwi, Abdulhameed: Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy (2016)
  2. Lee, Cheng-Chi; Li, Chun-Ta; Chiu, Shih-Ting; Lai, Yan-Ming: A new three-party-authenticated key agreement scheme based on chaotic maps without password table (2015)
  3. Lee, Tian-Fu; Lin, Ching-Ying; Lin, Chun-Li; Hwang, Tzonelih: Provably secure extended chaotic map-based three-party key agreement protocols using password authentication (2015)
  4. Li, Xiong; Niu, Jianwei; Kumari, Saru; Khan, Muhammad Khurram; Liao, Junguo; Liang, Wei: Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol (2015)
  5. Naik, R.Lalu; Reddy, P.Chenna: Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach (2015)
  6. Xie, Qi; Hu, Bin; Wu, Ting: Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server’s public key and smart card (2015)
  7. Lai, Hong; Orgun, Mehmet A.; Xiao, Jinghua; Pieprzyk, Josef; Xue, Liyin; Yang, Yixian: Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model (2014)
  8. Tian, Youliang; Ma, Jianfeng; Peng, Changgen; Wang, Yichuan; Zhang, Liumei: A rational framework for secure communication (2013)
  9. Tsai, Hao-Chuan; Chang, Chin-Chen: Provably secure three party encrypted key exchange scheme with explicit authentication (2013)
  10. Xie, Qi; Zhao, Jianmin; Yu, Xiuyuan: Chaotic maps-based three-party password-authenticated key agreement scheme (2013)
  11. Xiong, Hu; Chen, Yanan; Guan, Zhi; Chen, Zhong: Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys (2013)
  12. Chang, Ting-Yi: Dynamically generate a long-lived private key based on password keystroke features and neural network (2012)
  13. Li, Hui; Wu, Chuankun: CMQV+: an authenticated key exchange protocol from CMQV (2012)
  14. Wu, Shuhua; Pu, Qiong; Wang, Shengbao; He, Debiao: Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol (2012)
  15. Zhao, Jianjie; Gu, Dawu: Provably secure three-party password-based authenticated key exchange protocol (2012)
  16. Zhao, Jianjie; Gu, Dawu; Li, Yali; Cheng, Wei: On weaknesses of the HDCP authentication and key exchange protocol and its repair (2012)
  17. Chang, Ting-Yi; Hwang, Min-Shiang; Yang, Wei-Pang: A communication-efficient three-party password authenticated key exchange protocol (2011)
  18. Chung, Hao-Rung; Ku, Wei-Chi: Three weaknesses in a simple three-party Key exchange protocol (2008)
  19. Juang, Wen-Shenq; Nien, Wei-Ken: Efficient password authenticated Key agreement using bilinear pairings (2008)
  20. Li, Zhoujun; Guo, Hua; Zhang, Xiyong: Efficient and provably secure generic construction of client-to-client password-based key exchange protocol (2008)

1 2 next