메뉴 건너뛰기




Volumn 181, Issue 1, 2011, Pages 217-226

A communication-efficient three-party password authenticated key exchange protocol

Author keywords

Authentication; Cryptography; Key exchange; Password; Provably secure

Indexed keywords

AUTHENTICATION SERVERS; DIFFIE-HELLMAN ASSUMPTION; FORMAL PROOFS; KEY EXCHANGE; PARALLEL VERSION; PASSWORD; PASSWORD AUTHENTICATED KEY EXCHANGE PROTOCOLS; PASSWORD-AUTHENTICATED KEY EXCHANGE; PROVABLY SECURE; PUBLIC KEYS; RANDOM ORACLE MODEL; SESSION KEY; SYMMETRIC CRYPTOSYSTEMS; THREE-PARTY;

EID: 77958095782     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2010.08.032     Document Type: Article
Times cited : (93)

References (37)
  • 5
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • C.C. Chang, and Y.F. Chang A novel three-party encrypted key exchange protocol Computer Standards & Interfaces 26 5 2004 471 476
    • (2004) Computer Standards & Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 6
    • 18444399366 scopus 로고    scopus 로고
    • Simple authenticated key agreement and protected password change protocol
    • T.Y. Chang, W.P. Yang, and M.S. Hwang Simple authenticated key agreement and protected password change protocol Computers & Mathematics with Applications 49 5-6 2005 703 714
    • (2005) Computers & Mathematics with Applications , vol.49 , Issue.56 , pp. 703-714
    • Chang, T.Y.1    Yang, W.P.2    Hwang, M.S.3
  • 8
    • 35448940560 scopus 로고    scopus 로고
    • Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
    • H.B. Chen, T.H. Chen, W.B. Lee, and C.C. Chang Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks Computer Standards & Interfaces 30 1-2 2008 95 99
    • (2008) Computer Standards & Interfaces , vol.30 , Issue.12 , pp. 95-99
    • Chen, H.B.1    Chen, T.H.2    Lee, W.B.3    Chang, C.C.4
  • 9
    • 69649092978 scopus 로고    scopus 로고
    • Provably secure password-based three-party key exchange with optimal message steps
    • H.Y. Chien, and T.C. Wu Provably secure password-based three-party key exchange with optimal message steps Computer Journal 52 6 2009 646 655
    • (2009) Computer Journal , vol.52 , Issue.6 , pp. 646-655
    • Chien, H.Y.1    Wu, T.C.2
  • 10
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • H.R. Chung, and W.C. Ku Three weaknesses in a simple three-party key exchange protocol Information Sciences 178 1 2008 220 229
    • (2008) Information Sciences , vol.178 , Issue.1 , pp. 220-229
    • Chung, H.R.1    Ku, W.C.2
  • 11
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Y. Ding, and P. Horster Undetectable on-line password guessing attacks ACM Operating Systems Review 29 3 1995 22 30
    • (1995) ACM Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Ding, Y.1    Horster, P.2
  • 14
    • 0009733453 scopus 로고    scopus 로고
    • One round protocol for tripartite Diffie-Hellman
    • Incs 1838
    • A. Joux, One round protocol for tripartite Diffie-Hellman, in: Proc. of ANTS 4, Incs 1838, 2000.
    • (2000) Proc. of ANTS , vol.4
    • Joux, A.1
  • 15
    • 73149093942 scopus 로고    scopus 로고
    • Efficient user authentication and key agreement with user privacy protection
    • W.S. Juang, and J.L. Wu Efficient user authentication and key agreement with user privacy protection International Journal of Network Security 7 1 2008 120 129
    • (2008) International Journal of Network Security , vol.7 , Issue.1 , pp. 120-129
    • Juang, W.S.1    Wu, J.L.2
  • 16
    • 58049215501 scopus 로고    scopus 로고
    • Enhanced password-based simple three-party key exchange protocol
    • H.S. Kim, and J.Y. Choi Enhanced password-based simple three-party key exchange protocol Computers & Electrical Engineering 35 1 2009 107 114
    • (2009) Computers & Electrical Engineering , vol.35 , Issue.1 , pp. 107-114
    • Kim, H.S.1    Choi, J.Y.2
  • 17
    • 84875286190 scopus 로고    scopus 로고
    • An enhanced remote user authentication scheme with smart card
    • M. Kumar An enhanced remote user authentication scheme with smart card International Journal of Network Security 10 3 2010 175 184
    • (2010) International Journal of Network Security , vol.10 , Issue.3 , pp. 175-184
    • Kumar, M.1
  • 18
    • 77958081838 scopus 로고    scopus 로고
    • A new secure remote user authentication scheme with smart cards
    • M. Kumar A new secure remote user authentication scheme with smart cards International Journal of Network Security 11 3 2010 128 133
    • (2010) International Journal of Network Security , vol.11 , Issue.3 , pp. 128-133
    • Kumar, M.1
  • 19
    • 0033157651 scopus 로고    scopus 로고
    • An improvement of the password-based authentication protocol K1P on security against replay attacks
    • T. Kwon, M. Kang, S. Jung, and J. Song An improvement of the password-based authentication protocol K1P on security against replay attacks IEICE Transactions on Communications E82-B 7 1999 991 997
    • (1999) IEICE Transactions on Communications , vol.82 , Issue.7 , pp. 991-997
    • Kwon, T.1    Kang, M.2    Jung, S.3    Song, J.4
  • 20
    • 8344221264 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • T.F. Lee, T. Hwang, and C.L. Lin A novel three-party encrypted key exchange protocol Computers & Security 23 2004 571 577
    • (2004) Computers & Security , vol.23 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 22
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution
    • C.L. Lin, H.M. Sun, and T. Hwang Three-party encrypted key exchange: attacks and a solution ACM Operating Systems Review 34 4 2000 12 20
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 23
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • C.L. Lin, H.M. Sun, M. Steiner, and T. Hwang Three-party encrypted key exchange without server public-keys IEEE Communications Letters 5 12 2001 97 499
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 97-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 24
    • 10444279176 scopus 로고    scopus 로고
    • Provably secure three-party password-authenticated key exchange
    • C.L. Lin, H.A. Wen, T. Hwang, and H.M. Sun Provably secure three-party password-authenticated key exchange IEICE Transaction on Fundamentals E87-A 11 2004 2990 3000
    • (2004) IEICE Transaction on Fundamentals , vol.87 , Issue.11 , pp. 2990-3000
    • Lin, C.L.1    Wen, H.A.2    Hwang, T.3    Sun, H.M.4
  • 25
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • R. Lu, and Z. Cao Simple three-party key exchange protocol Computers & Security 26 1 2007 94 97
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 26
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • J. Nam, Y. Lee, S. Kim, and D. Won Security weakness in a three-party pairing-based protocol for password authenticated key exchange Information Sciences 177 6 2007 1364 1375
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 27
    • 63649090970 scopus 로고    scopus 로고
    • An off-line dictionary attack on a simple three-party key exchange protocol
    • J. Nam, J. Paik, H.K. Kang, U.M. Kim, and D. Won An off-line dictionary attack on a simple three-party key exchange protocol IEEE Communications Letters 13 3 2009 05 207
    • (2009) IEEE Communications Letters , vol.13 , Issue.3 , pp. 05-207
    • Nam, J.1    Paik, J.2    Kang, H.K.3    Kim, U.M.4    Won, D.5
  • 28
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • M. Peyravian, and N. Zunic Methods for protecting password transmission Computers & Security 19 5 2000 466 469
    • (2000) Computers & Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 30
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • H.M. Sun, B.C. Chen, and T. Hwang Secure key agreement protocols for three-party against guessing attacks The Journal of Systems and Software 75 1-2 2005 63 68
    • (2005) The Journal of Systems and Software , vol.75 , Issue.12 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 31
    • 77958098545 scopus 로고    scopus 로고
    • Pass-Go: A proposal to improve the usability of graphical passwords
    • H. Tao, and C. Adams Pass-Go: a proposal to improve the usability of graphical passwords International Journal of Network Security 7 2 2008 273 292
    • (2008) International Journal of Network Security , vol.7 , Issue.2 , pp. 273-292
    • Tao, H.1    Adams, C.2
  • 33
    • 21644467750 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol using weil pairing
    • H.A. Wen, T.F. Lee, and T. Hwang Provably secure three-party password-based authenticated key exchange protocol using weil pairing IEE Proceedings-Communications 152 2 2005 138 143
    • (2005) IEE Proceedings-Communications , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.A.1    Lee, T.F.2    Hwang, T.3
  • 34
    • 0742306164 scopus 로고    scopus 로고
    • Security of the improvement on the methods for protecting password transmission
    • C.C. Yang, T.Y. Chang, and M.S. Hwang Security of the improvement on the methods for protecting password transmission International Journal of Informatica 14 4 2003 551 558
    • (2003) International Journal of Informatica , vol.14 , Issue.4 , pp. 551-558
    • Yang, C.C.1    Chang, T.Y.2    Hwang, M.S.3
  • 36
    • 1842478681 scopus 로고    scopus 로고
    • Password-based user authentication and key distribution protocols for client-server applications
    • H.T. Yeh, and H.M. Sun Password-based user authentication and key distribution protocols for client-server applications The Journal of Systems and Software 72 1 2004 97 103
    • (2004) The Journal of Systems and Software , vol.72 , Issue.1 , pp. 97-103
    • Yeh, H.T.1    Sun, H.M.2
  • 37
    • 84875321481 scopus 로고    scopus 로고
    • An improvement on a three-party password-based key exchange protocol using weil pairing
    • Zeng Yong, Ma Jianfeng, and SangJae Moon An improvement on a three-party password-based key exchange protocol using weil pairing International Journal of Network Security 11 1 2010 17 22
    • (2010) International Journal of Network Security , vol.11 , Issue.1 , pp. 17-22
    • Yong, Z.1    Jianfeng, M.2    Moon, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.