메뉴 건너뛰기




Volumn 5075 LNCS, Issue , 2008, Pages 69-76

Highly efficient password-based three-party key exchange in random oracle model

Author keywords

Authentication; Guessing attack; Impersonation attack; Key agreement; Random oracle

Indexed keywords

INTERSYMBOL INTERFERENCE; LAWS AND LEGISLATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 45849121373     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-69304-8_8     Document Type: Conference Paper
Times cited : (2)

References (21)
  • 1
    • 84957629783 scopus 로고    scopus 로고
    • Relations among Notations of Security for Public Key Encryption Schemes
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among Notations of Security for Public Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-45. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure against Dictionary Attacks
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 0001940580 scopus 로고
    • Provably Secure Session Key Distribution: The Three Party Case
    • ACM Press, New York
    • Bellare, M., Rogaway, P.: Provably Secure Session Key Distribution: The Three Party Case. In: 27th ACM Symp. on the Theory of Comput., pp. 57-66. ACM Press, New York (1995)
    • (1995) 27th ACM Symp. on the Theory of Comput , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 2342566530 scopus 로고    scopus 로고
    • A Novel Three-Party Encrypted Key Exchange Protocol
    • Chang, C.C., Chang, Y.F.: A Novel Three-Party Encrypted Key Exchange Protocol. Computer Standards and Interfaces 26(5), 471-476 (2004)
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 5
    • 46749107236 scopus 로고    scopus 로고
    • Selectively Convertible Authenticated Encryption in The Random Oracle Model
    • January 17, doi:10.1093/comjnl/bxm090
    • Chien, H.Y.: Selectively Convertible Authenticated Encryption in The Random Oracle Model. The Computer Journal (January 17, 2008) (2008) doi:10.1093/comjnl/bxm090
    • (2008) The Computer Journal
    • Chien, H.Y.1
  • 6
    • 34948903343 scopus 로고    scopus 로고
    • Three Weaknesses in a Simple Three-Party Key Exchange Protocol
    • Chung, H.R., Ku, W.C.: Three Weaknesses in a Simple Three-Party Key Exchange Protocol. Information Sciences 178(1), 220-229 (2008)
    • (2008) Information Sciences , vol.178 , Issue.1 , pp. 220-229
    • Chung, H.R.1    Ku, W.C.2
  • 7
    • 0002805220 scopus 로고
    • Undetectable On-Line Password Guessing Attacks
    • Ding, Y., Horster, P.: Undetectable On-Line Password Guessing Attacks. ACM Operating Systems Review 29(4), 77-86 (1995)
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 8
    • 0003237987 scopus 로고
    • The Kerberos Network Authentication Service (V5)
    • Kohl, J., Neuman, C.: The Kerberos Network Authentication Service (V5). Internet Request for Comments 1510 (1993)
    • (1993) Internet Request for Comments , vol.1510
    • Kohl, J.1    Neuman, C.2
  • 9
    • 33646469746 scopus 로고    scopus 로고
    • Weaknesses of Yoon-Ryu-Yoo's Hash-Based Password Authentication Scheme
    • Ku, W.C., Chiang, M.H., Chang, S.T.: Weaknesses of Yoon-Ryu-Yoo's Hash-Based Password Authentication Scheme. ACM Operating Systems Review 39(1), 85-89 (2005)
    • (2005) ACM Operating Systems Review , vol.39 , Issue.1 , pp. 85-89
    • Ku, W.C.1    Chiang, M.H.2    Chang, S.T.3
  • 10
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced Three-Party Encrypted Key Exchange without Server Public Keys
    • Lee, T.F., Hwang, T., Lin, C.L.: Enhanced Three-Party Encrypted Key Exchange without Server Public Keys. Computers and Security 23(7), 571-577 (2004)
    • (2004) Computers and Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 11
    • 0008145442 scopus 로고    scopus 로고
    • Three Party-Encrypted Key Exchange: Attacks and a Solution
    • Lin, C.L., Sun, H.M., Hwang, T.: Three Party-Encrypted Key Exchange: Attacks and a Solution. ACM Operating System Review 34(4), 12-20 (2000)
    • (2000) ACM Operating System Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 12
    • 0035701459 scopus 로고    scopus 로고
    • Three-Party Encrypted Key Exchange without Server Public-Keys
    • Lin, C.L., Sun, H.M., Steiner, M., Hwang, T.: Three-Party Encrypted Key Exchange without Server Public-Keys. IEEE Commun. Lett. 5(12), 497-499 (2001)
    • (2001) IEEE Commun. Lett , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 13
    • 33846817471 scopus 로고    scopus 로고
    • Simple Three-Party Key Exchange Protocol
    • Lu, R., Cao, Z.: Simple Three-Party Key Exchange Protocol. Computers Security 26(1), 94-97 (2007)
    • (2007) Computers Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 14
    • 21144468597 scopus 로고
    • KryptoKnight Authentication and Key Distribution System
    • Deswarte, Y, Quisquater, J.-J, Eizenberg, G, eds, ESORICS 1992, Springer, Heidelberg
    • Molva, R., Tsudik, G., Van Herreweghen, E., Zatti, S.: KryptoKnight Authentication and Key Distribution System. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol. 648, pp. 1-16. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.648 , pp. 1-16
    • Molva, R.1    Tsudik, G.2    Van Herreweghen, E.3    Zatti, S.4
  • 15
    • 32244432466 scopus 로고    scopus 로고
    • Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords. IEICE Trans. on Fund. of Electronics, Communications and Computer Sciences
    • E89-A1
    • Nam, J., Kim, S., Won, D.: Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords. IEICE Trans. on Fund. of Electronics, Communications and Computer Sciences E89-A(1), 209-212 (2006)
    • (2006) , pp. 209-212
    • Nam, J.1    Kim, S.2    Won, D.3
  • 16
  • 17
    • 9544230689 scopus 로고    scopus 로고
    • Secure Key Agreement Protocols for Three-Party against Guessing Attacks
    • Sun, H.M., Chen, B.C., Hwang, T.: Secure Key Agreement Protocols for Three-Party against Guessing Attacks. The Journal of Systems and Software 75, 63-68 (2005)
    • (2005) The Journal of Systems and Software , vol.75 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 18
    • 12844274508 scopus 로고    scopus 로고
    • Note on Robust and Simple Authentication Protocol
    • Chien, H. Y., Wang, R.C., Yang, C.C.: Note on Robust and Simple Authentication Protocol. The Computer Journal 48(1), 27-29 (2005)
    • (2005) The Computer Journal , vol.48 , Issue.1 , pp. 27-29
    • Chien, H.Y.1    Wang, R.C.2    Yang, C.C.3
  • 20
    • 0029531472 scopus 로고
    • Optimal Authentication Protocols Resistant to Password Guessing Attacks
    • Gong, L.: Optimal Authentication Protocols Resistant to Password Guessing Attacks. In: The 8th IEEE Workshop on Computer Security Foundations, p. 24 (1995)
    • (1995) The 8th IEEE Workshop on Computer Security Foundations , pp. 24
    • Gong, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.