메뉴 건너뛰기




Volumn 5, Issue 4, 2010, Pages

An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography

Author keywords

Authentication key exchange; Bilinear maps; Provable security; Public key encryption

Indexed keywords

AUTHENTICATION KEY EXCHANGES; BILINEAR MAP; DIFFIE-HELLMAN ASSUMPTION; ELLIPTIC CURVE; ELLIPTIC CURVE CRYPTOGRAPHY; ENCRYPTED KEY EXCHANGE; INSECURE PUBLIC NETWORKS; PROVABLE SECURITY; PUBLIC-KEY ENCRYPTION; SESSION KEY; THE STANDARD MODEL; THREE-PARTY;

EID: 78651563216     PISSN: 19759320     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (13)

References (22)
  • 4
    • 0008145442 scopus 로고    scopus 로고
    • Three-Party Encrypted Key Exchange: Attack and A Solution
    • C. Lin, H. Sung and T. Hwang, Three-Party Encrypted Key Exchange: Attack and A Solution, ACM Operating System Review, vol.34, no. 4, pp.12-20,2000.
    • (2000) ACM Operating System Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.1    Sung, H.2    Hwang, T.3
  • 6
    • 36248947291 scopus 로고    scopus 로고
    • Three-Party Password Authenticated Key Exchange With Forward-Security
    • S. H.Wu and Y. F.Zhu, Three-Party Password Authenticated Key Exchange With Forward-Security, Chinese Journal of Computers, vol.30, no.10, pp.1833-1841,2007.
    • (2007) Chinese Journal of Computers , vol.30 , Issue.10 , pp. 1833-1841
    • Wu, S.H.1    Zhu, Y.F.2
  • 7
    • 77949545770 scopus 로고    scopus 로고
    • The Three-Party Password Authenticated Key Exchange Protocol With Stronger Security
    • DING Xiao-Fei, MA Chuan-Gui, The Three-Party Password Authenticated Key Exchange Protocol with Stronger Security, vol.33,no. 1:111-118, 2010.
    • (2010) , vol.33 , Issue.1 , pp. 111-118
    • Xiao-Fei, D.I.N.G.1    Chuan-Gui, M.A.2
  • 8
    • 0005078946 scopus 로고
    • Entity authentication and key distribution
    • LNCS
    • M. Bellare, P. Rogaway, Entity authentication and key distribution, in Advances in Cryptology-Crypto'93, LNCS, vol. 773, pp.222-249, 1993.
    • (1993) Advances In Cryptology-Crypto'93 , vol.773 , pp. 222-249
    • Bellare, M.1    Rogaway, P.2
  • 9
  • 11
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding, Y. and Horster, P., Undetectable on-line password guessing attacks, ACM Oper. Syst. Rev., vol. 29, pp.77-86, 1995.
    • (1995) ACM Oper. Syst. Rev , vol.29 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 12
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • H. Guo, Z. Li, Y. Mu, X. Zhang, Cryptanalysis of simple three-party key exchange protocol, Computers & Security, vol. 27, no. 1-2, pp.16-21, 2008.
    • (2008) Computers & Security , vol.27 , Issue.1-2 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 13
    • 35448940560 scopus 로고    scopus 로고
    • Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
    • H. B. Chen, T. H. Chen, W. B. Lee, C. C. Chang, Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks, Computer Standards & Interfaces, vol. 30, no. 1-2, pp.95-99, 2008.
    • (2008) Computer Standards & Interfaces , vol.30 , Issue.1-2 , pp. 95-99
    • Chen, H.B.1    Chen, T.H.2    Lee, W.B.3    Chang, C.C.4
  • 14
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • Sun, H.M., Chen, B.C. and Hwang, T., Secure key agreement protocols for three-party against guessing attacks, Journal of Systems and Software, vol.75, no.1-2, pp.63-68, 2005.
    • (2005) Journal of Systems and Software , vol.75 , Issue.1-2 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 15
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu, R. and Cao, Z., Simple three-party key exchange protocol, Computers & Security, vol. 26,no.1, pp.94-97,2007.
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 16
    • 78651585097 scopus 로고    scopus 로고
    • Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps
    • Hung-Yu Chien and Tzong-Chen Wu, Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps, The Computer Journal, pp.1-10,2008.
    • (2008) The Computer Journal , pp. 1-10
    • Hung-Yu, C.1    Tzong-Chen, W.2
  • 17
    • 47549109760 scopus 로고    scopus 로고
    • A round-and-computation-efficient three party authentication key exchange protocol
    • Chen, Y.J., Lee, W.B., Chen, H.B., A round-and-computation-efficient three party authentication key exchange protocol, Journal of Systems and Software, vol. 81, no. 9, pp.1581-1590,2008.
    • (2008) Journal of Systems and Software , vol.81 , Issue.9 , pp. 1581-1590
    • Chen, Y.J.1    Lee, W.B.2    Chen, H.B.3
  • 18
    • 68949161753 scopus 로고    scopus 로고
    • An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    • Jen-Ho Yang, Chin-Chen Chang, An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments, Journal of Systems and Software, vol.82,no.9, pp.1497-1502, 2009.
    • (2009) Journal of Systems and Software , vol.82 , Issue.9 , pp. 1497-1502
    • Jen-Ho, Y.1    Chin-Chen, C.2
  • 19
    • 0000537828 scopus 로고
    • Efficient identification and signature for smart cards
    • Springer-Verlag
    • Schnorr, C.P., Efficient identification and signature for smart cards, in Proceedings of CRYPTO'89, LNCS, Springer-Verlag, pp.229-252, 1989.
    • (1989) Proceedings of CRYPTO'89, LNCS , pp. 229-252
    • Schnorr, C.P.1
  • 21
    • 70350135983 scopus 로고    scopus 로고
    • Comparative study of tripartite identity-based authenticated key agreement protocols
    • M. Hölbl, T. Welzer, B. Brumen, Comparative study of tripartite identity-based authenticated key agreement protocols, Informatica 33, pp.347-355,2009.
    • (2009) Informatica , vol.33 , pp. 347-355
    • Hölbl, M.1    Welzer, T.2    Brumen, B.3
  • 22
    • 78651547134 scopus 로고    scopus 로고
    • An Enhanced Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile Commerce Environments
    • Zuowen Tan, An Enhanced Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile Commerce Environments, Journal of Communications, vol.5, no.6, 2010.
    • (2010) Journal of Communications, Vol , vol.5 , pp. 6
    • Zuowen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.