메뉴 건너뛰기




Volumn 88, Issue 6, 2011, Pages 1144-1157

Robust biometric-based three-party authenticated key establishment protocols

Author keywords

authentication; biometric; cryptography; password; three party; token

Indexed keywords


EID: 79952645251     PISSN: 00207160     EISSN: 10290265     Source Type: Journal    
DOI: 10.1080/00207160.2010.496851     Document Type: Article
Times cited : (3)

References (41)
  • 3
    • 77953567600 scopus 로고    scopus 로고
    • A workload characterization of elliptic curve cryptography methods in embedded environments
    • I. Branovic, R. Giorgi, and E. Martinelli, A workload characterization of elliptic curve cryptography methods in embedded environments, ACM SIGARCH Comput. Archit. News 32(3) (2004), pp. 27-34.
    • (2004) ACM SIGARCH Comput. Archit. News , vol.32 , Issue.3 , pp. 27-34
    • Branovic, I.1    Giorgi, R.2    Martinelli, E.3
  • 4
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • C. Chang and Y. Chang, A novel three-party encrypted key exchange protocol, Comput. Stand. Interfaces 26(2004) , pp. 471-476.
    • (2004) Comput. Stand. Interfaces , vol.26 , pp. 471-476
    • Chang, C.1    Chang, Y.2
  • 5
    • 47549109760 scopus 로고    scopus 로고
    • A round-and computation-efficient three-party authenticated key exchange protocol
    • T. Chen, W. Lee, and H. Chen, A round-and computation-efficient three-party authenticated key exchange protocol, J. Syst. Softw. 81(2008), 1581-1590.
    • (2008) J. Syst. Softw , vol.81 , pp. 1581-1590
    • Chen, T.1    Lee, W.2    Chen, H.3
  • 6
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • DOI 10.1016/j.ins.2007.08.004, PII S0020025507003878
    • H. Chung and W. Ku, Three weaknesses in a simple three-party key exchange protocol, Inf. Sci. 178(2008), 220-229. (Pubitemid 47531793)
    • (2008) Information Sciences , vol.178 , Issue.1 , pp. 220-229
    • Chung, H.-R.1    Ku, W.-C.2
  • 9
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • H. Guo, Z. Lia, Y. Mu, and X. Zhang, Cryptanalysis of simple three-party key exchange protocol, Comput. Secur. 27(2008), pp. 16-21.
    • (2008) Comput. Secur , vol.27 , pp. 16-21
    • Guo, H.1    Lia, Z.2    Mu, Y.3    Zhang, X.4
  • 10
    • 4043095653 scopus 로고    scopus 로고
    • Efficient three-party key exchange using smart cards
    • W. Juang, Efficient three-party key exchange using smart cards, IEEE Trans. Consum. Electron. 50(2004), pp. 619-624.
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , pp. 619-624
    • Juang, W.1
  • 11
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, Elliptic curve cryptosystems, Math. Comput. 48(1987), pp. 203-209.
    • (1987) Math. Comput. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 13
    • 0031381717 scopus 로고    scopus 로고
    • An adaptable and reliable authentication protocol for communication networks
    • T. Kwon, M. Kang, and J. Song, An adaptable and reliable authentication protocol for communication networks, Proc. of the IEEE INFOCOM'97, 1997, pp. 737-744.
    • (1997) Proc. of the IEEE INFOCOM'97 , pp. 737-744
    • Kwon, T.1    Kang, M.2    Song, J.3
  • 14
    • 0031680336 scopus 로고    scopus 로고
    • Efficient key exchange and authentication protocols protecting weak secrets
    • T. Kwon and J. Song, Efficient key exchange and authentication protocols protecting weak secrets, IEICE Trans. Fundam. E81-A (1) (1998), pp. 156-163.
    • (1998) IEICE Trans. Fundam , vol.E81-A , Issue.1 , pp. 156-163
    • Kwon, T.1    Song, J.2
  • 15
    • 0033157651 scopus 로고    scopus 로고
    • Improvement of the password-based authentication protocol (K1P) on security against replay attacks
    • T. Kwon, M. Kang, S. Jung, and J. Song, An improvement of the password based authentication protocol (K1P) on security against replay attacks, IEICE Trans. Commun. E82-B (7) (1999), pp. 991-997. (Pubitemid 30531776)
    • (1999) IEICE Transactions on Communications , vol.E82-B , Issue.7 , pp. 991-997
    • Kwon Taekyoung1    Kang Myeongho2    Jung Sangjoon3    Song Jooseok4
  • 16
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without server's public key
    • DOI 10.1016/j.amc.2004.06.129, PII S0096300304005454
    • S. Lee, H. Kim, and K. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key, Appl. Math. Comput. 167(2005), pp. 996-1003. (Pubitemid 41344804)
    • (2005) Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.-W.1    Kim, H.-S.2    Yoo, K.-Y.3
  • 17
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • T. Lee, T. Hwang, and C. Lin, Enhanced three-party encrypted key exchange without server public keys, Comput. Secur. 23(2004), pp. 571-577.
    • (2004) Comput. Secur , vol.23 , pp. 571-577
    • Lee, T.1    Hwang, T.2    Lin, C.3
  • 18
    • 67649791953 scopus 로고    scopus 로고
    • Communication-efficient three-party protocols for authentication and key agreement
    • T. Lee, J. Liu, M. Sung, S. Yang, and C. Chen, Communication-efficient three-party protocols for authentication and key agreement, Comput. Math. Appl. 58(2009), pp. 641-648.
    • (2009) Comput. Math. Appl. , vol.58 , pp. 641-648
    • Lee, T.1    Liu, J.2    Sung, M.3    Yang, S.4    Chen, C.5
  • 19
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution
    • C. Lin, H. Sun, and T. Hwang, Three-party encrypted key exchange: Attacks and a solution, ACM Oper. Syst. Rev. 34(2000), pp. 12-20.
    • (2000) ACM Oper. Syst. Rev. , vol.34 , pp. 12-20
    • Lin, C.1    Sun, H.2    Hwang, T.3
  • 20
    • 0035701459 scopus 로고    scopus 로고
    • Three-party Encrypted Key Exchange without server public-keys
    • DOI 10.1109/4234.974498, PII S1089779801110720
    • C. Lin, H. Sun, M. Steiner, and T. Hwang, Three-party encrypted key exchange without server public-keys, IEEE Commun. Lett. 5(2001), pp. 497-499. (Pubitemid 34099691)
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.-L.1    Sun, H.-M.2    Steiner, M.3    Hwang, T.4
  • 21
    • 0037282439 scopus 로고    scopus 로고
    • A password authentication scheme with secure password updating
    • C. Lin and T. Hwang, A password authentication scheme with secure password updating, Comput. Secur. 22(2003), pp. 68-72.
    • (2003) Comput. Secur , vol.22 , pp. 68-72
    • Lin, C.1    Hwang, T.2
  • 22
    • 33748126252 scopus 로고    scopus 로고
    • A password authentication scheme over insecure networks
    • DOI 10.1016/j.jcss.2005.10.001, PII S0022000005001157
    • I. Liao, C. Lee, and M. Hwang, A password authentication scheme over insecure networks, J. Comput. Syst. Sci. 72(2006), pp. 727-740. (Pubitemid 44308160)
    • (2006) Journal of Computer and System Sciences , vol.72 , Issue.4 , pp. 727-740
    • Liao, I-E.1    Lee, C.-C.2    Hwang, M.-S.3
  • 23
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • DOI 10.1016/j.cose.2006.08.005, PII S0167404806001246
    • R. Lu and Z. Cao, Simple three-party key exchange protocol, Comput. Secur. 26(2007), pp. 94-97. (Pubitemid 46216493)
    • (2007) Computers and Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 27
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • DOI 10.1016/j.ins.2006.09.001, PII S0020025506002714
    • J. Nam, Y. Lee, S. Kim, and D. Won, Security weakness in a three-party pairing-based protocol for password authenticated key exchange, Inform. Sci. 177(6) (2007), pp. 1364-1375. (Pubitemid 46037672)
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 29
    • 42649086478 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
    • R. Phan, W. Yau, and B. Go, Cryptanalysis of simple three-party key exchange protocol (S-3PAKE), Inform. Sci. 178(3) (2008), pp. 2849-2856.
    • (2008) Inform. Sci. , vol.178 , Issue.3 , pp. 2849-2856
    • Phan, R.1    Yau, W.2    Go, B.3
  • 30
    • 0003855464 scopus 로고    scopus 로고
    • 2nd ed., John Wiley & Sons, Inc., New York
    • B. Shneier, Applied Cryptography, 2nd ed., John Wiley & Sons, Inc., New York, 1996.
    • (1996) Applied Cryptography
    • Shneier, B.1
  • 32
    • 33845638410 scopus 로고    scopus 로고
    • An improved deniable authentication protocol
    • J. Shao, Z. Cao, and R. Lu, An improved deniable authentication protocol, Networks 48(2006), pp. 179-181.
    • (2006) Networks , vol.48 , pp. 179-181
    • Shao, J.1    Cao, Z.2    Lu, R.3
  • 33
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudik, and M. Waidner, Refinement and extension of encrypted key exchange, ACM Oper. Syst. Rev. 29(1995), pp. 22-30.
    • (1995) ACM Oper. Syst. Rev. , vol.29 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 34
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • H. Sun, B. Chen, and T. Hwang, Secure key agreement protocols for three-party against guessing attacks, J. Syst. Softw. 75(2005), pp. 63-68.
    • (2005) J. Syst. Softw , vol.75 , pp. 63-68
    • Sun, H.1    Chen, B.2    Hwang, T.3
  • 35
    • 21944455037 scopus 로고    scopus 로고
    • A simple protocol for deniable authentication based on EIGamal cryptography
    • DOI 10.1002/net.20062
    • Y. Wang, J. Li, and L. Tie, A simple protocol for deniable authentication based on ElGamal cryptography, Networks 45(2005), pp. 193-194. (Pubitemid 40948516)
    • (2005) Networks , vol.45 , Issue.4 , pp. 193-194
    • Wang, Y.1    Li, J.2    Tie, L.3
  • 36
    • 21644467750 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
    • DOI 10.1049/ip-com:20045087
    • H. Wen, T. Lee, and T. Hwang, Provably secure three-party password-based authenticated key exchange protocol using Weil pairing, IEE Proc., Commun. 152(2) (2005), pp. 138-143. (Pubitemid 40925390)
    • (2005) IEE Proceedings: Communications , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.-A.1    Lee, T.-F.2    Hwang, T.3
  • 37
    • 68949161753 scopus 로고    scopus 로고
    • An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    • J. Yang and C. Chang, An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments, J. Syst. Softw. 82(2009), pp. 1497-1502.
    • (2009) J. Syst. Softw , vol.82 , pp. 1497-1502
    • Yang, J.1    Chang, C.2
  • 39
    • 0345098454 scopus 로고    scopus 로고
    • Efficient three-party authentication and key agreement protocols resistant to password guessing attacks
    • H. Yeh, H. Sun, and T. Hwang, Efficient three-party authentication and key agreement protocols resistant to password guessing attacks, Inf. Sci. Eng. 19(2003), pp. 1059-1070.
    • (2003) Inf. Sci. Eng. , vol.19 , pp. 1059-1070
    • Yeh, H.1    Sun, H.2    Hwang, T.3
  • 41
    • 42949161502 scopus 로고    scopus 로고
    • Improving the novel three-party encrypted key exchange protocol
    • DOI 10.1016/j.csi.2007.08.018, PII S0920548907000797
    • E. Yoon and K. Yoo, Improving the novel three-party encrypted key exchange protocol, Comput. Stand. Interfaces 30(2008), pp. 309-314. (Pubitemid 351609330)
    • (2008) Computer Standards and Interfaces , vol.30 , Issue.5 , pp. 309-314
    • Yoon, E.-J.1    Yoo, K.-Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.