메뉴 건너뛰기




Volumn 35, Issue 1, 2009, Pages 107-114

Enhanced password-based simple three-party key exchange protocol

Author keywords

BPR model; Password based key exchange protocol; Undetectable on line guessing attack

Indexed keywords

LUTETIUM;

EID: 58049215501     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2008.05.007     Document Type: Article
Times cited : (53)

References (19)
  • 1
    • 36349014859 scopus 로고    scopus 로고
    • A new method for using hash functions to solve remote user authentication
    • Chen T.H., and Lee W.B. A new method for using hash functions to solve remote user authentication. Comput Electr Eng 34 1 (2008) 53-62
    • (2008) Comput Electr Eng , vol.34 , Issue.1 , pp. 53-62
    • Chen, T.H.1    Lee, W.B.2
  • 2
    • 22644442489 scopus 로고    scopus 로고
    • Password authenticated key exchange protocols among diverse network domains
    • Yeh H.T., and Sun H.M. Password authenticated key exchange protocols among diverse network domains. Comput Electr Eng 31 3 (2005) 175-189
    • (2005) Comput Electr Eng , vol.31 , Issue.3 , pp. 175-189
    • Yeh, H.T.1    Sun, H.M.2
  • 3
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding Y., and Horster P. Undetectable on-line password guessing attacks. ACM Operat Syst Rev 29 4 (1995) 77-86
    • (1995) ACM Operat Syst Rev , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 4
    • 0026850091 scopus 로고    scopus 로고
    • Bellovin SM, Merritt M. Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of the 1992 IEEE symposium on research in security and privacy; 1992. p. 72-84.
    • Bellovin SM, Merritt M. Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of the 1992 IEEE symposium on research in security and privacy; 1992. p. 72-84.
  • 5
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • Lee T.F., Hwang T., and Lin C.L. Enhanced three-party encrypted key exchange without server public keys. Comput Secur 23 7 (2004) 571-577
    • (2004) Comput Secur , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 6
    • 21644467750 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol using weil pairing
    • Wen H.A., Lee T.F., and Hwang T. Provably secure three-party password-based authenticated key exchange protocol using weil pairing. IEE Proc Commun 152 2 (2005) 138-143
    • (2005) IEE Proc Commun , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.A.1    Lee, T.F.2    Hwang, T.3
  • 7
    • 0027726717 scopus 로고    scopus 로고
    • Bellare M, Rogaway P. Random oracles arepractical: a paradigm for designing efficient protocols. In: Proceedings of the first ACM annual conference on computer and communications security; 1993. p. 62-73.
    • Bellare M, Rogaway P. Random oracles arepractical: a paradigm for designing efficient protocols. In: Proceedings of the first ACM annual conference on computer and communications security; 1993. p. 62-73.
  • 8
    • 84945119254 scopus 로고    scopus 로고
    • Bellare M, Rogaway P. Entity authentication and key distribution. In: Proceedings of the Crypto 93, LNCS, vol. 773; 1993. p. 232-49.
    • Bellare M, Rogaway P. Entity authentication and key distribution. In: Proceedings of the Crypto 93, LNCS, vol. 773; 1993. p. 232-49.
  • 9
    • 58049195717 scopus 로고    scopus 로고
    • Bellare M, Rogaway P. Provably secure session key distribution: the three party case. In: Proceedings of the 27th ACM symposium on the theory of computing; 1995. p. 57-66.
    • Bellare M, Rogaway P. Provably secure session key distribution: the three party case. In: Proceedings of the 27th ACM symposium on the theory of computing; 1995. p. 57-66.
  • 10
    • 84873466407 scopus 로고    scopus 로고
    • Bellare M, Pointcheval P, Rogaway P. Authenticated key exchange secure against dictionary attacks. In: Proceedings of the Eurocrypt'00, LNCS, vol. 1807; 2000. p. 139-55.
    • Bellare M, Pointcheval P, Rogaway P. Authenticated key exchange secure against dictionary attacks. In: Proceedings of the Eurocrypt'00, LNCS, vol. 1807; 2000. p. 139-55.
  • 11
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • Nam J., Lee Y., Kim S., and Won D. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Inform Sci 177 6 (2007) 1364-1375
    • (2007) Inform Sci , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 12
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu R., and Cao Z. Simple three-party key exchange protocol. Comput Secur 26 1 (2007) 94-97
    • (2007) Comput Secur , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 13
    • 33751229614 scopus 로고    scopus 로고
    • Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
    • Shim K., and Woo S.S. Cryptanalysis of tripartite and multi-party authenticated key agreement protocols. Inform Sci 177 4 (2007) 1143-1151
    • (2007) Inform Sci , vol.177 , Issue.4 , pp. 1143-1151
    • Shim, K.1    Woo, S.S.2
  • 14
    • 24144443144 scopus 로고    scopus 로고
    • Abdalla M, Pointcheval D. Simple password-based encrypted key exchange protocols. In: Proceedings of the CT-RSA'05, LNCS, vol. 3376; 2005. p. 191-208.
    • Abdalla M, Pointcheval D. Simple password-based encrypted key exchange protocols. In: Proceedings of the CT-RSA'05, LNCS, vol. 3376; 2005. p. 191-208.
  • 15
    • 34447321042 scopus 로고    scopus 로고
    • EC2C-PAKA: an efficient client-to-client password-authenticated key agreement
    • 10.1016/j.ins.2007.03.24
    • Byun J.W., Lee D.H., and Lim J.I. EC2C-PAKA: an efficient client-to-client password-authenticated key agreement. Inform Sci (2007) 10.1016/j.ins.2007.03.24
    • (2007) Inform Sci
    • Byun, J.W.1    Lee, D.H.2    Lim, J.I.3
  • 16
    • 18444399366 scopus 로고    scopus 로고
    • Simple authenticated key agreement and protected password change protocol
    • Chang T.Y., Yang W.P., and Hwang M.S. Simple authenticated key agreement and protected password change protocol. Comput Math Appl 49 5-6 (2005) 703-714
    • (2005) Comput Math Appl , vol.49 , Issue.5-6 , pp. 703-714
    • Chang, T.Y.1    Yang, W.P.2    Hwang, M.S.3
  • 17
    • 33747171940 scopus 로고    scopus 로고
    • The importance of proofs of security for key establishment protocols: formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols
    • Choo K.K.R., Boyd C., and Hitchcock Y. The importance of proofs of security for key establishment protocols: formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. Comput Commun 29 15 (2006) 2788-2797
    • (2006) Comput Commun , vol.29 , Issue.15 , pp. 2788-2797
    • Choo, K.K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 19
    • 33644748254 scopus 로고    scopus 로고
    • Provably secure authenticated key exchange protocols for low power computing clients
    • Wen H.A., Lin C.L., and Hwang T. Provably secure authenticated key exchange protocols for low power computing clients. Comput Secur 25 2 (2006) 106-113
    • (2006) Comput Secur , vol.25 , Issue.2 , pp. 106-113
    • Wen, H.A.1    Lin, C.L.2    Hwang, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.