메뉴 건너뛰기




Volumn 152, Issue 2, 2005, Pages 138-143

Provably secure three-party password-based authenticated key exchange protocol using Weil pairing

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; CRYPTOGRAPHY; DATA TRANSFER; FUNCTIONS; NETWORK PROTOCOLS; PROBLEM SOLVING; RANDOM PROCESSES; SERVERS;

EID: 21644467750     PISSN: 13502425     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1049/ip-com:20045087     Document Type: Conference Paper
Times cited : (77)

References (25)
  • 3
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • Jablon, D.: 'Strong password-only authenticated key exchange', Comput. Commun. Rev., 1996, 26, (5), pp. 5-26
    • (1996) Comput. Commun. Rev. , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 4
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password authenticated key exchange using diffie-hellman
    • Boyko, V., MacKenzie, P., and Patel, S.: 'Provably secure password authenticated key exchange using diffie-hellman'. Advances in cryptology - EUROCRYPT 2000, 2000, pp. 156-171
    • (2000) Advances in Cryptology - EUROCRYPT 2000 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 6
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password fild compromise
    • Bellovin, S.M., and Merritt, M.: 'Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password fild compromise'. Proc. ACM Conf. Computers and Communication Security, 1993, pp. 244-250
    • (1993) Proc. ACM Conf. Computers and Communication Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 7
    • 0013443819 scopus 로고    scopus 로고
    • Extended password methods immune to dictionary attack
    • Cambridge, MA, USA
    • Jablon, D.: 'Extended password methods immune to dictionary attack'. Presented at WETIGE'97 Enterprise Security Workshop, Cambridge, MA, USA, 1997
    • (1997) WETIGE'97 Enterprise Security Workshop
    • Jablon, D.1
  • 9
    • 0032640752 scopus 로고    scopus 로고
    • xy via password authentication
    • xy via password authentication', Electron. Lett., 1999, 35, (11), pp. 892-893
    • (1999) Electron. Lett. , vol.35 , Issue.11 , pp. 892-893
    • Kwon, T.1    Song, J.2
  • 10
    • 0027615231 scopus 로고
    • Protecting poorly chosen secrets from guessing attacks
    • Gong, L., Lomas, M., Needham, R., and Saltzer, J.: 'Protecting poorly chosen secrets from guessing attacks', IEEE J. Sel. Areas Commun., 1993, 11, (5), pp. 648-656
    • (1993) IEEE J. Sel. Areas Commun. , vol.11 , Issue.5 , pp. 648-656
    • Gong, L.1    Lomas, M.2    Needham, R.3    Saltzer, J.4
  • 11
    • 0029531472 scopus 로고
    • Optimal authentication protocol resistant password guessing attack
    • County Kerry, Ireland, June
    • Gong, L.: 'Optimal authentication protocol resistant password guessing attack'. Proc. 8th IEEE Computer Security Foundations Workshop, County Kerry, Ireland, June 1995, pp. 24-29
    • (1995) Proc. 8th IEEE Computer Security Foundations Workshop , pp. 24-29
    • Gong, L.1
  • 12
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • Steiner, M., Tsudik, G., and Waidner, M.: 'Refinement and extension of encrypted key exchange', ACM Operating Syst. Rev., 1995, 29, (3), pp. 22-30
    • (1995) ACM Operating Syst. Rev. , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 13
    • 0033157651 scopus 로고    scopus 로고
    • An improvement of the password-based authentication protocol (kip) on security against replay attacks
    • Kwon, T., Kang, M., Jung, S., and Song, J.: 'An improvement of the password-based authentication protocol (kip) on security against replay attacks', IEICE Trans. Commun., 1999, E82-B, (7), pp. 991-997
    • (1999) IEICE Trans. Commun. , vol.E82-B , Issue.7 , pp. 991-997
    • Kwon, T.1    Kang, M.2    Jung, S.3    Song, J.4
  • 14
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution
    • Lin, C., Sung, H., and Hwang, T.: "Three-party encrypted key exchange: Attacks and a solution', ACM Operating Syst. Rev., 2000, 34, (4), pp. 12-20
    • (2000) ACM Operating Syst. Rev. , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.1    Sung, H.2    Hwang, T.3
  • 15
    • 0009733453 scopus 로고    scopus 로고
    • One round protocol for tripartite Diffiie-Hellman
    • lncs 1838
    • Joux, A.: 'One round protocol for tripartite Diffiie-Hellman'. Proc. of ANTS 4, lncs 1838, 2000, pp. 385-394
    • (2000) Proc. of ANTS 4 , pp. 385-394
    • Joux, A.1
  • 17
    • 21644456068 scopus 로고    scopus 로고
    • Identity-based authenticated key agreement protocol based on Weil pairing
    • Smart, N.: 'Identity-based authenticated key agreement protocol based on Weil pairing', Electron. Lett., 2003, 39, (2), pp. 208-209
    • (2003) Electron. Lett. , vol.39 , Issue.2 , pp. 208-209
    • Smart, N.1
  • 18
    • 21644440761 scopus 로고    scopus 로고
    • Efficient one round tripartite authenticated key agreement protocol from Weil pairing
    • Shim, K.: 'Efficient one round tripartite authenticated key agreement protocol from Weil pairing', Electron. Lett., 2002, 38, (13), pp. 630-632
    • (2002) Electron. Lett. , vol.38 , Issue.13 , pp. 630-632
    • Shim, K.1
  • 19
    • 0037461946 scopus 로고    scopus 로고
    • Efficient id-based key agreement protocol from weil pairing
    • Yi, X.: 'Efficient id-based key agreement protocol from weil pairing', Electron. Lett., 2003, 39, (2), pp. 206-208
    • (2003) Electron. Lett. , vol.39 , Issue.2 , pp. 206-208
    • Yi, X.1
  • 23
    • 0029543006 scopus 로고
    • Efficient network authentification protocols: Lower bounds and implementations
    • Gong, L.: 'Efficient network authentification protocols: Lower bounds and implementations', Distrib. Comput., 1995, 9, (3), pp. 131-145
    • (1995) Distrib. Comput. , vol.9 , Issue.3 , pp. 131-145
    • Gong, L.1
  • 25
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • Menezes, A.J., Okamoto, T., and Vanstone, S.: 'Reducing elliptic curve logarithms to logarithms in a finite field'. IEEE Trans. Inf. Theory, 1993, 39, (5), pp. 1639-1646
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.5 , pp. 1639-1646
    • Menezes, A.J.1    Okamoto, T.2    Vanstone, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.