메뉴 건너뛰기




Volumn 180, Issue 9, 2010, Pages 1702-1714

Simple password-based three-party authenticated key exchange without server public keys

Author keywords

3PAKE; Authentication; Communicating protocol; Network security; Password based; Three party key exchange

Indexed keywords

AUTHENTICATED KEY EXCHANGE; AUTHENTICATED KEY EXCHANGE PROTOCOLS; COMMUNICATING PROTOCOLS; IN-NETWORK; KEY EXCHANGE; MUTUAL AUTHENTICATION; PASSWORD-BASED; PUBLIC KEYS; PUBLIC NETWORKS; RANDOM ORACLE MODEL; SECURE COMMUNICATIONS; SERVER AUTHENTICATION; THREE-PARTY;

EID: 76349117227     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2010.01.005     Document Type: Article
Times cited : (45)

References (25)
  • 1
    • 84937579774 scopus 로고    scopus 로고
    • The oracle Diffie-Hellman assumptions and an analysis of DHIES
    • D. Naccache Ed, Topics in Cryptology, CT-RSA
    • M. Abdalla, M. Bellare, P. Rogaway, The oracle Diffie-Hellman assumptions and an analysis of DHIES, in: D. Naccache (Ed.), Topics in Cryptology - CT-RSA 2001, Lecture Notes in Computer Science, vol. 2020, 2001, pp. 143-158.
    • (2001) Lecture Notes in Computer Science , vol.2020 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 2
    • 33646809001 scopus 로고    scopus 로고
    • A simple threshold authenticated key exchange from short secrets
    • Advances in Cryptology, Proceedings of ASIACRYPT '05
    • M. Abdalla, O. Chevassut, P.-A. Fouque, D. Pointcheval, A simple threshold authenticated key exchange from short secrets, in: Advances in Cryptology - Proceedings of ASIACRYPT '05, Lecture Notes in Computer Science, vol. 3788, 2005, pp. 566-588.
    • (2005) Lecture Notes in Computer Science , vol.3788 , pp. 566-588
    • Abdalla, M.1    Chevassut, O.2    Fouque, P.-A.3    Pointcheval, D.4
  • 4
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based authenticated key protocols
    • Topics in Cryptology, CT-RSA
    • M. Abdalla, D. Pointcheval, Simple password-based authenticated key protocols, in: Topics in Cryptology - CT-RSA 2005, Lecture Notes in Computer Science, vol. 3376, 2005, pp. 191-208.
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 191-208
    • Abdalla, M.1    Pointcheval, D.2
  • 5
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Bellare M., Kilian J., and Rogaway P. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61 3 (2000) 362-399
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 11
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • Chung H.-R., and Ku W.-C. Three weaknesses in a simple three-party key exchange protocol. Information Sciences 178 (2008) 220-229
    • (2008) Information Sciences , vol.178 , pp. 220-229
    • Chung, H.-R.1    Ku, W.-C.2
  • 13
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding Y., and Horster P. Undetectable on-line password guessing attacks. ACM Operating Systems Review 29 4 (1995) 77-86
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 14
    • 0029543006 scopus 로고
    • Efficient network authentication protocols: lower bounds and implementations
    • Gong L. Efficient network authentication protocols: lower bounds and implementations. Distributed Computing 9 3 (1995) 131-145
    • (1995) Distributed Computing , vol.9 , Issue.3 , pp. 131-145
    • Gong, L.1
  • 16
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • Guo H., Li Z., Mu Y., and Zhang X. Cryptanalysis of simple three-party key exchange protocol. Computers and Security 27 (2008) 16-21
    • (2008) Computers and Security , vol.27 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 17
    • 58049215501 scopus 로고    scopus 로고
    • Enhanced password-based simple three-party key exchange protocol
    • Kim H.-S., and Choi J.-Y. Enhanced password-based simple three-party key exchange protocol. Computers and Electrical Engineering 35 1 (2009) 107-114
    • (2009) Computers and Electrical Engineering , vol.35 , Issue.1 , pp. 107-114
    • Kim, H.-S.1    Choi, J.-Y.2
  • 18
    • 0033157651 scopus 로고    scopus 로고
    • An improvement of the password-based authentication protocol (K1P) on security against replay attacks
    • Kwon T., Kang M., Jung S., and Song J. An improvement of the password-based authentication protocol (K1P) on security against replay attacks. IEICE Transactions on Communications E82-B 7 (1999) 991-997
    • (1999) IEICE Transactions on Communications , vol.E82-B , Issue.7 , pp. 991-997
    • Kwon, T.1    Kang, M.2    Jung, S.3    Song, J.4
  • 19
    • 0031680336 scopus 로고    scopus 로고
    • Efficient key exchange and authentication protocols protecting weak secrets
    • Kwon T., and Song J. Efficient key exchange and authentication protocols protecting weak secrets. IEICE Trans. Fundamentals E81-A 1 (1998) 156-163
    • (1998) IEICE Trans. Fundamentals , vol.E81-A , Issue.1 , pp. 156-163
    • Kwon, T.1    Song, J.2
  • 20
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • Lee T.-F., Hwang T., and Lin C.-L. Enhanced three-party encrypted key exchange without server public keys. Computers and Security 23 7 (2004) 571-577
    • (2004) Computers and Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.-F.1    Hwang, T.2    Lin, C.-L.3
  • 21
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: attacks and a solution
    • Lin C.-L., Sun H.-M., and Hwang T. Three-party encrypted key exchange: attacks and a solution. ACM Operating Systems Review 34 4 (2000) 12-20
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.-L.1    Sun, H.-M.2    Hwang, T.3
  • 22
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • Lin C.-L., Sun H.-M., Steiner M., and Hwang T. Three-party encrypted key exchange without server public-keys. IEEE Communications Letters 5 12 (2001) 497-499
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.-L.1    Sun, H.-M.2    Steiner, M.3    Hwang, T.4
  • 23
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu R., and u Cao Z. Simple three-party key exchange protocol. Computers and Security 26 1 (2007) 94-97
    • (2007) Computers and Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    u Cao, Z.2
  • 24
    • 42649086478 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
    • Phan R.C.-W., Yau W.-C., and Goi B.-M. Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). Information Sciences 178 13 (2008) 2849-2856
    • (2008) Information Sciences , vol.178 , Issue.13 , pp. 2849-2856
    • Phan, R.C.-W.1    Yau, W.-C.2    Goi, B.-M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.