메뉴 건너뛰기




Volumn 82, Issue 9, 2009, Pages 1497-1502

An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments

Author keywords

Authenticated key exchange; Elliptic curve cryptography; Mobile commerce environments

Indexed keywords

AUTHENTICATED KEY EXCHANGE; AUTHENTICATED KEY EXCHANGE PROTOCOLS; COMMUNICATION EFFICIENCY; COMMUNICATION LOAD; COMPUTATION COSTS; ELLIPTIC CURVE CRYPTOGRAPHY; MOBILE COMMERCE; MOBILE COMMUNICATIONS; MOBILE-COMMERCE ENVIRONMENTS; PUBLIC NETWORKS; SECURE COMMUNICATIONS; SESSION KEY EXCHANGE; THREE-PARTY; TRANSACTION CONFIDENTIALITY; USER AUTHENTICATION;

EID: 68949161753     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2009.03.075     Document Type: Article
Times cited : (53)

References (20)
  • 3
    • 68949133924 scopus 로고    scopus 로고
    • The Third Generation Partnership Project
    • The Third Generation Partnership Project, .
  • 5
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • Chang C.C., and Chang Y.F. A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26 5 (2004) 472-476
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.5 , pp. 472-476
    • Chang, C.C.1    Chang, Y.F.2
  • 6
    • 35349020500 scopus 로고    scopus 로고
    • Layered access control schemes on watermarked scalable media
    • Chang F.C., Huang H.C., and Hang H.M. Layered access control schemes on watermarked scalable media. Journal of VLSI Signal Processing 49 3 (2007) 443-455
    • (2007) Journal of VLSI Signal Processing , vol.49 , Issue.3 , pp. 443-455
    • Chang, F.C.1    Huang, H.C.2    Hang, H.M.3
  • 7
    • 10444220191 scopus 로고    scopus 로고
    • Efficient identity-based authenticated key agreement protocol from pairings
    • Choie Y.J., Jeong E., and Lee E. Efficient identity-based authenticated key agreement protocol from pairings. Applied Mathematics and Computation 162 (2005) 179-188
    • (2005) Applied Mathematics and Computation , vol.162 , pp. 179-188
    • Choie, Y.J.1    Jeong, E.2    Lee, E.3
  • 8
    • 47549109760 scopus 로고    scopus 로고
    • A round-and computation-efficient three-party authenticated key exchange protocol
    • Chen T.H., Lee W.B., and Chen H.B. A round-and computation-efficient three-party authenticated key exchange protocol. Journal of Systems and Software 81 (2008) 1581-1590
    • (2008) Journal of Systems and Software , vol.81 , pp. 1581-1590
    • Chen, T.H.1    Lee, W.B.2    Chen, H.B.3
  • 10
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • Koblitz N. Elliptic curve cryptosystem. Mathematics of Computation 48 (1987) 203-209
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 12
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • Lee T.F., Hwang T., and Lin C.L. Enhanced three-party encrypted key exchange without server public keys. Computer and Security 23 7 (2004) 571-577
    • (2004) Computer and Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 13
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without server's public key
    • Lee S.W., Kim H.S., and Yoo K.Y. Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 167 2 (2005) 996-1003
    • (2005) Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 14
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: attacks and a solution
    • Lin C.L., Sun H.M., and Hwang T. Three-party encrypted key exchange: attacks and a solution. ACM Operating Systems Review 34 (2000) 12-20
    • (2000) ACM Operating Systems Review , vol.34 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 17
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • Proceedings of CRYPTO' 89, Springer-Verlag, pp
    • Schnorr, C.P., 1989. Efficient identification and signatures for smart cards. In: Proceedings of CRYPTO' 89, LNCS, Springer-Verlag, pp. 239-252.
    • (1989) LNCS , pp. 239-252
    • Schnorr, C.P.1
  • 18
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • Sun H.M., Chen B.C., and Hwang T. Secure key agreement protocols for three-party against guessing attacks. Journal of Systems and Software 75 (2005) 63-68
    • (2005) Journal of Systems and Software , vol.75 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 19
    • 28244469017 scopus 로고    scopus 로고
    • Analysis and improvement of an authenticated key exchange protocol for sensor networks
    • Tiang X., Wong D.S., and Zhu R.W. Analysis and improvement of an authenticated key exchange protocol for sensor networks. IEEE Communications Letters 9 11 (2005) 970-972
    • (2005) IEEE Communications Letters , vol.9 , Issue.11 , pp. 970-972
    • Tiang, X.1    Wong, D.S.2    Zhu, R.W.3
  • 20
    • 28244469017 scopus 로고    scopus 로고
    • Analysis and improvement of authenticated key exchange protocol for sensor networks
    • Tian X., Wong D.S., and Zhu R.W. Analysis and improvement of authenticated key exchange protocol for sensor networks. IEEE Communications Letters 9 11 (2005) 970-972
    • (2005) IEEE Communications Letters , vol.9 , Issue.11 , pp. 970-972
    • Tian, X.1    Wong, D.S.2    Zhu, R.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.