메뉴 건너뛰기




Volumn 52, Issue 6, 2009, Pages 646-655

Provably secure password-based three-party key exchange with optimal message steps

Author keywords

Authentication; Guessing attack; Impersonation attack; Key agreement; Random oracle; Security

Indexed keywords

GUESSING ATTACK; IMPERSONATION ATTACK; KEY AGREEMENT; RANDOM ORACLE; SECURITY;

EID: 69649092978     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxn070     Document Type: Article
Times cited : (30)

References (20)
  • 1
    • 0003237987 scopus 로고
    • The Kerberos Network Authentication Service (V5)
    • Kohl, J. and Neuman, C. (1993) The Kerberos Network Authentication Service (V5). Internet Request for Comments 1510.
    • (1993) Internet Request for Comments , pp. 1510
    • Kohl, J.1    Neuman, C.2
  • 2
    • 21144468597 scopus 로고
    • KryptoKnight Authentication and Key Distribution System
    • Proc. 1992 European Symp. Research in Computer Security, ESORICS,Toulouse, France, November 23-25, pp, Springer, Berlin
    • Molva, R., Tsudik, G., Herreweghen, E.V. and Zatti, S. (1992) KryptoKnight Authentication and Key Distribution System. Proc. 1992 European Symp. Research in Computer Security - ESORICS,Toulouse, France, November 23-25, pp. 1-16, Lecture Notes in Computer Science, Vol. 648. Springer, Berlin.
    • (1992) Lecture Notes in Computer Science , vol.648 , pp. 1-16
    • Molva, R.1    Tsudik, G.2    Herreweghen, E.V.3    Zatti, S.4
  • 3
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure Against Dictionary Attacks
    • Eurocrypt 2000, Belgium, May 14-18, pp, Springer, Berlin
    • Bellare, M., Pointcheval, D. and Rogaway, P. (2000) Authenticated Key Exchange Secure Against Dictionary Attacks. Eurocrypt 2000, Belgium, May 14-18, pp. 139-155, Lecture Notes in Computer Science, Vol. 1807. Springer, Berlin.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 4
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding, Y. and Horster, P. (1995) Undetectable on-line password guessing attacks. ACM Oper. Syst. Rev., 29, 77-86.
    • (1995) ACM Oper. Syst. Rev , vol.29 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 5
    • 69649087201 scopus 로고    scopus 로고
    • IEEE P1363.2: Password-based public-key cryptography. http:// grouper.ieee.org/groups/1363/passwdPK/index.html.
    • IEEE P1363.2: Password-based public-key cryptography. http:// grouper.ieee.org/groups/1363/passwdPK/index.html.
  • 6
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • Steiner, M., Tsudik, G. and Wainder, M. (1995) Refinement and extension of encrypted key exchange. ACM Oper. Syst. Rev., 29, 22-30.
    • (1995) ACM Oper. Syst. Rev , vol.29 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Wainder, M.3
  • 7
    • 0008145442 scopus 로고    scopus 로고
    • Three party-encrypted key exchange: Attacks and a solution
    • Lin, C.L., Sun, H.M. and Hwang, T. (2000) Three party-encrypted key exchange: Attacks and a solution. ACM Oper. Syst. Rev., 34, 12-20.
    • (2000) ACM Oper. Syst. Rev , vol.34 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 8
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • Sun, H.M., Chen, B.C. and Hwang, T. (2005) Secure key agreement protocols for three-party against guessing attacks. J. Syst. Softw. 75, 63-68.
    • (2005) J. Syst. Softw , vol.75 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 9
    • 2342566530 scopus 로고    scopus 로고
    • Anovel three-party encrypted key exchange protocol
    • Chang, C.C. and Chang, Y.F. (2004)Anovel three-party encrypted key exchange protocol. Compu. Stand. Interfaces, 26, 471-476.
    • (2004) Compu. Stand. Interfaces , vol.26 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 10
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • Chung, H.R. and Ku, W.C. (2008) Three weaknesses in a simple three-party key exchange protocol. Inf. Sci., 178, 220-229.
    • (2008) Inf. Sci , vol.178 , pp. 220-229
    • Chung, H.R.1    Ku, W.C.2
  • 11
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • Lee, T.F., Hwang, T. and Lin, C.L. (2004) Enhanced three-party encrypted key exchange without server public keys. Comput. Secur., 23, 571-577.
    • (2004) Comput. Secur , vol.23 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 12
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • Lin, C.L., Sun, H.M., Steiner, M. and Hwang, T. (2001) Three-party encrypted key exchange without server public-keys. IEEE Commun. Lett. 5, 497-499.
    • (2001) IEEE Commun. Lett , vol.5 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 13
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu, R. and Cao, Z. (2007) Simple three-party key exchange protocol. Comput. Secur., 26, 94-97.
    • (2007) Comput. Secur , vol.26 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 14
    • 32244432466 scopus 로고    scopus 로고
    • Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords
    • Nam, J., Kim, S. and Won, D. (2006) Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., E89-A, 209-212.
    • (2006) IEICE Trans. Fundam. Electron. Commun. Comput. Sci , vol.E89-A , pp. 209-212
    • Nam, J.1    Kim, S.2    Won, D.3
  • 15
    • 45849121373 scopus 로고    scopus 로고
    • Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model
    • Proc. IEEE ISI 2008 Taiwan, June 17-20, pp, Springer, Berlin
    • Chien, H.-Y. and Wu, T.-C. (2008) Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. Proc. IEEE ISI 2008 Taiwan, June 17-20, pp. 69-76, Lecture Notes in Computer Science, Vol. 5075. Springer, Berlin.
    • (2008) Lecture Notes in Computer Science , vol.5075 , pp. 69-76
    • Chien, H.-Y.1    Wu, T.-C.2
  • 16
    • 0029531472 scopus 로고
    • Optimal Authentication Protocols Resistant to Password Guessing Attacks
    • Ireland, June 13-15, pp, IEEE
    • Gong, L. (1995) Optimal Authentication Protocols Resistant to Password Guessing Attacks. Proc. 8th IEEE Workshop on Computer Security Foundations, Ireland, June 13-15, pp. 24-29. IEEE.
    • (1995) Proc. 8th IEEE Workshop on Computer Security Foundations , pp. 24-29
    • Gong, L.1
  • 17
    • 0027744838 scopus 로고
    • Lower Bounds on Messages and Rounds for Network Authentication Protocols
    • Fair-fax,Virginia, November 3-5, pp, ACM press
    • Gong, L. (1993) Lower Bounds on Messages and Rounds for Network Authentication Protocols. Proc. 1st ACM Conf. Computer and Communications Security 1993, Fair-fax,Virginia, November 3-5, pp. 26-37. ACM press.
    • (1993) Proc. 1st ACM Conf. Computer and Communications Security 1993 , pp. 26-37
    • Gong, L.1
  • 18
    • 46749107236 scopus 로고    scopus 로고
    • Selectively convertible authenticated encryption in the random oracle model
    • Chien, H.-Y. (2008) Selectively convertible authenticated encryption in the random oracle model. Comput. J., 51, 419-434.
    • (2008) Comput. J , vol.51 , pp. 419-434
    • Chien, H.-Y.1
  • 19
    • 84957629783 scopus 로고    scopus 로고
    • Relations Among Notations of Security for Public Key Encryption Schemes
    • Proc. CRYPTO'98, Santa Barbara, CA, USA, August 23-27, pp, Springer, Berlin
    • Bellare, M., Desai, A., Pointcheval, D. and Rogaway, P. (1998) Relations Among Notations of Security for Public Key Encryption Schemes. Proc. CRYPTO'98, Santa Barbara, CA, USA, August 23-27, pp. 26-45, Lecture Notes in Computer Science, Vol. 1462. Springer, Berlin.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 20
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • Nevada, USA, May 29-June 1, pp, ACM press
    • Bellare, M. and Rogaway, P. (1995) Provably secure session key distribution: The three party case. Proc. 27th ACM Symp. Theory of Computing, Nevada, USA, May 29-June 1, pp. 57-66. ACM press.
    • (1995) Proc. 27th ACM Symp. Theory of Computing , pp. 57-66
    • Bellare, M.1    Rogaway, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.