Research Article

Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model

Table 1

Security proof comparison.

Protocol Idealized assumption Adversary capability Resistance to UDOD attacks

Our protocol None Not restricted Proven
GPAKE [21] None Restricted from corrupting parties No [4]
NGPAKE [4] None Not proven
Lin and Hwang [7] Random oracles Not restricted Not proven
Wu et al. [8] Random oracles Not restricted Not proven

Resistance to undetectable online dictionary attacks.