메뉴 건너뛰기




Volumn 6, Issue 11, 2010, Pages 5259-5274

Smart card-based secure web services in the three-party setting

Author keywords

Authentication; Password; Random oracle model; Smart card; Three party key agreement

Indexed keywords

COMPUTATION COSTS; FORWARD SECRECY; IMPERSONATION ATTACK; KEY CONFIRMATION; MASTER KEY; NETWORK DOMAINS; PARTY KEY AGREEMENT PROTOCOLS; PASSWORD; PASSWORD GUESSING ATTACK; PERFECT FORWARD SECRECY; RANDOM ORACLE MODEL; RAPID DEVELOPMENT; REPLAY ATTACK; SECURE COMMUNICATIONS; SECURE WEB-SERVICES; SERVICE PROVIDER; SERVICE REQUESTERS; SESSION KEY; THREE-PARTY; TRUSTED THIRD PARTIES; WEB TECHNOLOGIES;

EID: 78650405278     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (33)
  • 1
    • 78650316951 scopus 로고    scopus 로고
    • Advan red Enrryption Standard
    • Advan red Enrryption Standard, littp://csrc.inst.guv/encryptiun/aes/.
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from tile weil pairing
    • D. Boneh and M. Frinklin, Identity-based encryption from tile weil pairing, Advances in CryptologyCRYPTO '01, LNCS, vol.2 139, pp.2 13-229, 2001.
    • (2001) Advances in CryptologyCRYPTO '01, LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Frinklin, M.2
  • 4
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • R. Canetti and H. Krawczyk, Analysis of key-exchange protocols and their use for building secure channels, Advan ces in Cryptology-EUROCR YPT'OJ, LNCS, vol.2045, pp.453-474, 2001.
    • (2001) Advan Ces in Cryptology-EUROCR ypt'Oj, LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 5
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • C. C. Chang and Y. F. Chang, A novel three-party encrypted key exchange protocol, Computer Standards é Interfaces, vol.26, no.5, pp.471-476, 2004.
    • (2004) Computer Standards é Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 9
    • 35448940560 scopus 로고    scopus 로고
    • Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
    • H. B. Chen, T. H. Chen, W. B. Lee and C. C. Chang, Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks, Computer Standards Interfaces, vol.30, no.1-2, pp.95-99, 2008.
    • (2008) Computer Standards Interfaces , vol.30 , Issue.1-2 , pp. 95-99
    • Chen, H.B.1    Chen, T.H.2    Lee, W.B.3    Chang, C.C.4
  • 10
    • 69649092978 scopus 로고    scopus 로고
    • Provably secure password-based three-party key exchange with optimal message steps
    • H. Y. Chien and T. C. Wu, Provably secure password-based three-party key exchange with optimal message steps, The Computer Journal, vol.52, no.6, pp.646-655, 2009.
    • (2009) The Computer Journal , vol.52 , Issue.6 , pp. 646-655
    • Chien, H.Y.1    Wu, T.C.2
  • 11
    • 0002805220 scopus 로고
    • Undetected on-line password guessing attacks
    • Y. Ding and P. Horster, Undetected on-line password guessing attacks, ACM Operating Systems Review, vol.29, no.4, pp.77-86, 199S.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 12
    • 0032649638 scopus 로고    scopus 로고
    • The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
    • T. Frey, M. Muller and H. Thick, The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems, IEEE Trans. on Information Theory, vol.45, no.5, pp.1717-1719, 1999.
    • (1999) IEEE Trans. on Information Theory , vol.45 , Issue.5 , pp. 1717-1719
    • Frey, T.1    Muller, M.2    Thick, H.3
  • 13
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • H. Guo, Z. Li, Y. Mu and X. Zhang, Cryptanalysis of simple three-party key exchange protocol, Computerw E4 Security, vol.27, no.1-2, pp.16-21, 2008.
    • (2008) Computerw E4 Security , vol.27 , Issue.1-2 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 16
    • 4043095653 scopus 로고    scopus 로고
    • Efficient three-party key exchange using smart cards
    • W. S. Juang, Efficient three-party key exchange using smart cards, IEEE Trans. on Consumer Electronics, vol.50, no.2, pp.619-624, 2004.
    • (2004) IEEE Trans. on Consumer Electronics , vol.50 , Issue.2 , pp. 619-624
    • Juang, W.S.1
  • 18
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A high-performance secure Diffie-Hellman protocol
    • H. Krawczyk, HMQV: A high-performance secure Diffie-Hellman protocol, Advances in CryptologyCRYPTO'05, LNCS, vol.3621, pp.546-566, 2005.
    • (2005) Advances in CryptologyCRYPTO'05, LNCS , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 19
    • 48249142956 scopus 로고    scopus 로고
    • Three-round smart card-based key exchange scheme
    • J. 0. Kwon and I. R. Jeong, Three-round smart card-based key exchange scheme, IEICE Trans. on Corn mnunications, vol.E90-B, no.11, pp.3255-3258, 2007.
    • (2007) IEICE Trans. on Corn Mnunications , vol.90 , Issue.11 , pp. 3255-3258
    • Kwon, J.O.1    Jeong, I.R.2
  • 20
    • 1842715081 scopus 로고    scopus 로고
    • The advantages of elliptic curve cryptography for wireless security
    • K. Lauter, The advantages of elliptic curve cryptography for wireless security, IEEE Wireless Comnmnunications, vol.11, no.1, pp.62 67, 2004.
    • (2004) IEEE Wireless Comnmnunications , vol.11 , Issue.1 , pp. 62-67
    • Lauter, K.1
  • 22
    • 35448936926 scopus 로고    scopus 로고
    • Identity-based broadcast signcryption
    • F. Li, X. Xin and Y. Hu, Identity-based broadcast signcryption, Computer Standards Interfaces, vol.30, no.1-2, pp.89-94, 2008.
    • (2008) Computer Standards Interfaces , vol.30 , Issue.1-2 , pp. 89-94
    • Li, F.1    Xin, X.2    Hu, Y.3
  • 23
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • R. Lu and Z. Cao, Simple three-party key exchange protocol, Computers 4 Security, vol.26, no.1, pp.94-97, 2007.
    • (2007) Computers 4 Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 24
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • A. Menezes, T. Okamoto and S. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. on Information Theory, vol.39, no.5, pp.1639-16/16, 1993.
    • (1993) IEEE Trans. on Information Theory , vol.39 , Issue.5 , pp. 1639-1636
    • Menezes, A.1    Okamoto, T.2    Vanstone, S.3
  • 25
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart card security under tile threat of power analysis attacks
    • T. S. Messerges, E. A. Dabbish and R. H. Sloan, Examining smart card security under tile threat of power analysis attacks, IEEE Trans. on Computers, vol.51, no.5, pp.541-552, 2002.
    • (2002) IEEE Trans. on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 26
    • 32244432466 scopus 로고    scopus 로고
    • Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords
    • J. Nam and S. Kim, Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords, IEICE Trans. Fundamentals, vol.E89-A, no.1, pp.209-212, 2006.
    • (2006) IEICE Trans. Fundamentals , vol.89 , Issue.1 , pp. 209-212
    • Nam, J.1    Kim, S.2
  • 27
    • 42649086478 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
    • R. C. W. Phan, W. C. Yau and B. M. Goi, Cryptanalysis of simple three-party key exchange protocol (S-3PAKE), Information Sciences, vol.178, no.13, pp.2849-2856, 2008.
    • (2008) Information Sciences , vol.178 , Issue.13 , pp. 2849-2856
    • Phan, R.C.W.1    Yau, W.C.2    Goi, B.M.3
  • 29
  • 30
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • H. M. Sun, B. C. Chen and T. Hwang, Secure key agreement protocols for three-party against guessing attacks, The Journal of Systems and Software, vol.75, no.1-2, pp.63-68, 200S.
    • (2005) The Journal of Systems and Software , vol.75 , Issue.1-2 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 32
    • 77956248934 scopus 로고    scopus 로고
    • The home network system by mutual complement of wireless and wired communications
    • K. Yamada, K. Kimura, H. Yuki and K. Yoshida, The home network system by mutual complement of wireless and wired communications, ICIC Eipress Letters, vol.2, no.1, pp.73-79, 2008.
    • (2008) ICIC Eipress Letters , vol.2 , Issue.1 , pp. 73-79
    • Yamada, K.1    Kimura, K.2    Yuki, H.3    Yoshida, K.4
  • 33
    • 42949161502 scopus 로고    scopus 로고
    • Improving the novel three-party encrypted key exchange protocol
    • E. J. Yoon and K. Y. Yoo, Improving the novel three-party encrypted key exchange protocol, Cornputer Standards Interfaces, vol.30, no.5, pp.309-314, 2008.
    • (2008) Cornputer Standards Interfaces , vol.30 , Issue.5 , pp. 309-314
    • Yoon, E.J.1    Yoo, K.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.