메뉴 건너뛰기




Volumn 26, Issue 1, 2007, Pages 94-97

Simple three-party key exchange protocol

Author keywords

Key exchange; Password based; Protocol; Three party key exchange

Indexed keywords

DATA PRIVACY; PUBLIC KEY CRYPTOGRAPHY; SECURITY SYSTEMS; SERVERS;

EID: 33846817471     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2006.08.005     Document Type: Article
Times cited : (170)

References (15)
  • 1
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols
    • Topics in cryptology - CT-RSA 2005, Springer-Verlag p. 191-208
    • Abdalla M., and Pointcheval D. Simple password-based encrypted key exchange protocols. Topics in cryptology - CT-RSA 2005. LNCS (2005), Springer-Verlag p. 191-208
    • (2005) LNCS
    • Abdalla, M.1    Pointcheval, D.2
  • 2
    • 0026850091 scopus 로고
    • Encrypted key exchange: password-based protocols secure against dictionary attacks
    • IEEE Computer Society Press
    • Bellovin S.M., and Merrit M. Encrypted key exchange: password-based protocols secure against dictionary attacks. Proceedings of IEEE symposium on research in security and privacy (May 1992), IEEE Computer Society Press 72-84
    • (1992) Proceedings of IEEE symposium on research in security and privacy , pp. 72-84
    • Bellovin, S.M.1    Merrit, M.2
  • 3
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • Proceedings of sixth IMA international conference on cryptography and coding, Springer-Verlag
    • Blake-Wilson S., Johnson D., and Menezes A. Key agreement protocols and their security analysis. Proceedings of sixth IMA international conference on cryptography and coding. LNCS 1355 (1997), Springer-Verlag 30-45
    • (1997) LNCS 1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 4
    • 35048899816 scopus 로고    scopus 로고
    • Key agreement using statically keyed authenticators
    • Applied cryptography and network security - ACNS'2004, Springer-Verlag p. 248-62
    • Boyd C., Mao W., and Paterson K. Key agreement using statically keyed authenticators. Applied cryptography and network security - ACNS'2004. LNCS 3089 (2004), Springer-Verlag p. 248-62
    • (2004) LNCS 3089
    • Boyd, C.1    Mao, W.2    Paterson, K.3
  • 5
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • Chang C.C., and Chang Y.F. A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26 5 (2004) 471-476
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 7
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding Y., and Horster P. Undetectable on-line password guessing attacks. ACM Operating Systems Review 29 4 (1995) 77-86
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 9
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • Lee T.F., Hwang T., and Lin C.L. Enhanced three-party encrypted key exchange without server public keys. Computers and Security 23 7 (2004) 571-577
    • (2004) Computers and Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 10
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without server's public key
    • Lee S.W., Kim H.S., and Yoo K.Y. Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 167 2 (2005) 996-1003
    • (2005) Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 11
    • 0008145442 scopus 로고    scopus 로고
    • Three party-encrypted key exchange: attacks and a solution
    • Lin C.L., Sun H.M., and Hwang T. Three party-encrypted key exchange: attacks and a solution. ACM Operating Systems Review 34 4 (2000) 12-20
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 12
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • Lin C.L., Sun H.M., Steiner M., and Hwang T. Three-party encrypted key exchange without server public-keys. IEEE Communication Letters 5 12 (2001) 497-499
    • (2001) IEEE Communication Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 14
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • Sun H.M., Chen B.C., and Hwang T. Secure key agreement protocols for three-party against guessing attacks. The Journal of Systems and Software 75 (2005) 63-68
    • (2005) The Journal of Systems and Software , vol.75 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 15
    • 33645437508 scopus 로고    scopus 로고
    • ID-based one round authenticated tripartite key agreement protocol with pairings
    • Available from:
    • Zhang F., Liu S., and Kim K. ID-based one round authenticated tripartite key agreement protocol with pairings. Cryptology ePrint archive, report 2002/122 (2002). http://eprint.iarc.org/2002/122 Available from:
    • (2002) Cryptology ePrint archive, report 2002/122
    • Zhang, F.1    Liu, S.2    Kim, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.