International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014


Survey on Public key Encryption for Two Server Password only Authenticated Key Exchange

Nishikant Burande | Gumaste S.V. [3]


Abstract: By using cryptographic key client and server establishes a connection in between them and authenticate each other. In other words they use password to authenticate that is Password-authenticated key exchange (PAKE). The password necessary to authenticate are stored in a single server. If server is hacked or due to insider attack it is compromised then all password may stole by hacker and they may misuse it. In this paper find a way to overcome this problem by using two servers to authenticate in which two servers cooperate to each other. If one server is compromised then attacker still cannot hack the passwords stored in server. For the said purpose two ways are there symmetric & asymmetric, in symmetric two servers equally contribute and in asymmetric one server authenticates the client with the help of another server. This paper presents a symmetric solution for two-server PAKE, where client can establish different cryptographic keys with two servers resp. Proposed protocol runs in parallel and is more efficient than existing symmetric two-server PAKE protocol.


Keywords: Cryptography, password only authenticated exchange, Diffie-Hellman key exchange, ElGamal encryption


Edition: Volume 3 Issue 12, December 2014,


Pages: 252 - 255


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Nishikant Burande, Gumaste S.V., "Survey on Public key Encryption for Two Server Password only Authenticated Key Exchange", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 252-255, https://www.ijsr.net/get_abstract.php?paper_id=SUB14345

Similar Articles with Keyword 'Cryptography'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [10] | R. Sathya [8]

Share this Article
Top