메뉴 건너뛰기




Volumn 33, Issue 1, 2010, Pages 111-118

The three-party password-authenticated key exchange protocol with stronger security

Author keywords

ECC; Forward secrecy; PAKE; PCI attack; Provable security

Indexed keywords

ELLIPTIC CURVE CRYPTOSYSTEM; ENTITY AUTHENTICATIONS; FORWARD SECRECY; IDEAL-CIPHER MODEL; PASSWORD AUTHENTICATED KEY EXCHANGE PROTOCOLS; PASSWORD-AUTHENTICATED KEY EXCHANGE; PROVABLE SECURITY; PUBLIC KEYS; RANDOM ORACLE; SECRET KEY; THREE-PARTY;

EID: 77949545770     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1016.2010.00111     Document Type: Article
Times cited : (7)

References (11)
  • 5
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attack and a solution
    • Lin C, Sung H, Hwang T. Three-party encrypted key exchange: Attack and a solution. ACM Operating System Review, 2000, 34(4): 12-20
    • (2000) ACM Operating System Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.1    Sung, H.2    Hwang, T.3
  • 7
  • 9
    • 36248947291 scopus 로고    scopus 로고
    • Three-party password authenticated key exchange with forward-security
    • Wu S H, Zhu Y F. Three-party password authenticated key exchange with forward-security. Chinese Journal of Computers, 2007, 30(10): 1833-1841
    • (2007) Chinese Journal of Computers , vol.30 , Issue.10 , pp. 1833-1841
    • Wu, S.H.1    Zhu, Y.F.2
  • 10
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Switzerland
    • Abdalla M, Fouque P A, Pointcheval D. Password-based authenticated key exchange in the three-party setting//Proceedings of the PKC'05. Switzerland, 2005: 65-84
    • (2005) Proceedings of the PKC'05 , pp. 65-84
    • Abdalla, M.1    Fouque, P.A.2    Pointcheval, D.3
  • 11
    • 77949552730 scopus 로고    scopus 로고
    • Analysis and improvement of client-to-client password-authenticated key exchange protocols
    • Beijing: Information Security and State
    • Xu J, Zhang Z F, Feng D G. Analysis and improvement of client-to-client password-authenticated key exchange protocols//Proceedings of the Security Protocols, 3rd SKLOIS Workshop. Beijing: Information Security and State, 2007: 119-124
    • (2007) Proceedings of the Security Protocols, 3rd SKLOIS Workshop , pp. 119-124
    • Xu, J.1    Zhang, Z.F.2    Feng, D.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.