메뉴 건너뛰기




Volumn 81, Issue 9, 2008, Pages 1581-1590

A round- and computation-efficient three-party authenticated key exchange protocol

Author keywords

Authenticated key exchange; Authentication; Key agreement; Network security

Indexed keywords

ELECTRONIC COMMERCE;

EID: 47549109760     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2007.11.720     Document Type: Article
Times cited : (63)

References (21)
  • 1
    • 0026850091 scopus 로고    scopus 로고
    • Bellovin, S.M., Merrit, M., 1992. Encrypted key exchanged: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 72-84.
    • Bellovin, S.M., Merrit, M., 1992. Encrypted key exchanged: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 72-84.
  • 3
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • Chang C.C., and Chang Y.F. A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26 5 (2004) 472-476
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.5 , pp. 472-476
    • Chang, C.C.1    Chang, Y.F.2
  • 5
    • 0029531472 scopus 로고    scopus 로고
    • Gong, L., 1995. Optimal authentication protocols resistant to password guessing attack. In: Proceedings of the 8th IEEE Computer Security Foundation Workshop, pp. 24-29.
    • Gong, L., 1995. Optimal authentication protocols resistant to password guessing attack. In: Proceedings of the 8th IEEE Computer Security Foundation Workshop, pp. 24-29.
  • 7
    • 4043095653 scopus 로고    scopus 로고
    • Efficient three-party key exchange using smart cards
    • Jaung W.S. Efficient three-party key exchange using smart cards. IEEE Transactions on Consumer Electronics 50 2 (2004) 619-624
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 619-624
    • Jaung, W.S.1
  • 9
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • Lee T.F., Hwang T., and Lin C.L. Enhanced three-party encrypted key exchange without server public keys. Computer and Security 23 7 (2004) 571-577
    • (2004) Computer and Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 10
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without server's public key
    • Lee S.W., Kim H.S., and Yoo K.Y. Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 167 2 (2005) 996-1003
    • (2005) Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 11
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: attacks and a solution
    • Lin C.L., Sun H.M., and Hwang T. Three-party encrypted key exchange: attacks and a solution. ACM Operating Systems Review 34 (2000) 12-20
    • (2000) ACM Operating Systems Review , vol.34 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 13
    • 32244432466 scopus 로고    scopus 로고
    • Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords
    • Nam J., Kim S., and Won D. Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords. IEICE Transactions on Fundamentals E89-A 1 (2006) 209-212
    • (2006) IEICE Transactions on Fundamentals , vol.E89-A , Issue.1 , pp. 209-212
    • Nam, J.1    Kim, S.2    Won, D.3
  • 14
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • Nam J., Lee Y., Kim S., and Won D. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences 177 6 (2007) 1364-1375
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 15
    • 0028514601 scopus 로고
    • Kerberos: an authentication service for computer networks
    • Neuman B.C., and Ts'o T. Kerberos: an authentication service for computer networks. IEEE Communication Magazine 32 9 (1994) 33-38
    • (1994) IEEE Communication Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2
  • 17
    • 47549115877 scopus 로고
    • Springer-Verlag pp. 239-252
    • Schnorr C.P. Efficient identification and signatures for smart cards. CRYPTO'89 (1990), Springer-Verlag pp. 239-252
    • (1990) CRYPTO'89
    • Schnorr, C.P.1
  • 19
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • Sun H.M., Chen B.C., and Hwang T. Secure key agreement protocols for three-party against guessing attacks. The Journal of Systems and Software 75 (2005) 63-68
    • (2005) The Journal of Systems and Software , vol.75 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 20
    • 21644467750 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
    • Wen H.A., Lee T.F., and Hwang T. Provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEE Proceedings of Communications 152 2 (2005) 138-143
    • (2005) IEE Proceedings of Communications , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.A.1    Lee, T.F.2    Hwang, T.3
  • 21
    • 0345098454 scopus 로고    scopus 로고
    • Efficient three-party authentication and key agreement protocols resistant to password guessing attacks
    • Yeh H.T., Sun H.M., and Hwang T. Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. International Journal of Information and System Engineering 19 6 (2003) 1059-1070
    • (2003) International Journal of Information and System Engineering , vol.19 , Issue.6 , pp. 1059-1070
    • Yeh, H.T.1    Sun, H.M.2    Hwang, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.