2012
DOI: 10.1007/978-3-642-31284-7_1
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of a Multi-factor Authenticated Key Exchange Protocol

Abstract: This paper shows several security weaknesses of a Multi-Factor Authenticated Key Exchange (MK-AKE) protocol, proposed by Pointcheval and Zimmer at ACNS'08. The Pointcheval-Zimmer scheme was designed to combine three authentication factors in one system, including a password, a secure token (that stores a private key) and biometrics. In a formal model, Pointcheval and Zimmer formally proved that an attacker had to break all three factors to win. However, the formal model only considers the threat that an attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…For the elliptic curve, a similar check is needed to ensure the received element is a valid public key over the elliptic curve. The importance of this checkknown as the public key validationin key exchange protocols has been highlighted by Menezes and Ustagolu [24] in 2006 and also by a recent attack reported in 2012 [25].…”
Section: Preventing Small Subgroup Attacks On the Dragonfly Protocolmentioning
confidence: 99%
“…For the elliptic curve, a similar check is needed to ensure the received element is a valid public key over the elliptic curve. The importance of this checkknown as the public key validationin key exchange protocols has been highlighted by Menezes and Ustagolu [24] in 2006 and also by a recent attack reported in 2012 [25].…”
Section: Preventing Small Subgroup Attacks On the Dragonfly Protocolmentioning
confidence: 99%
“…It uses an ElGamal public key encryption [27] for securing biometric information. However, in 2012, it has been found to be insecure by Hao and Clarke [28]. The insecurity of PZ is that an attacker, who steals a password, is able to deduce biometric information.…”
Section: Introductionmentioning
confidence: 99%
“…There are some authentication algorithms, which are proposed to be used in mobile devices. To improve the security of mobile device's users, some researchers recommended adding second factor of authentication [31][32][33][34][35][36]. In the following part, different kinds of these kinds of algorithms are introduced to get some ideas to use these authentication methods in mobile cloud computing is discussed.…”
Section: Introductionmentioning
confidence: 99%