메뉴 건너뛰기




Volumn 27, Issue 3, 2011, Pages 1059-1072

Security analysis and enhancements of verifier-based password-authenticated key exchange protocols in the three-party setting

Author keywords

Cryptanalysis; Elliptic curve; Password authenticated key exchange; Three party; Verifier based

Indexed keywords

CRYPTANALYSIS; ELLIPTIC CURVE; PASSWORD AUTHENTICATED KEY EXCHANGE; THREE-PARTY; VERIFIER-BASED;

EID: 79958169657     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (1)

References (23)
  • 1
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • in Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography
    • M. Abdalla, P. A. Fouque, and D. Pointcheval, "Password-based authenticated key exchange in the three-party setting," in Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, LNCS 3386, 2005, pp. 65-84.
    • (2005) LNCS , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.A.2    Pointcheval, D.3
  • 2
    • 26444476977 scopus 로고    scopus 로고
    • Interactive Diffie-Hellman assumptions with applications to password-based authentication
    • in Proceedings of the 9th International Conference on Financial Cryptography and Data Security
    • M. Abdalla and D. Pointcheval, "Interactive Diffie-Hellman assumptions with applications to password-based authentication," in Proceedings of the 9th International Conference on Financial Cryptography and Data Security, LNCS 3570, 2005, pp. 341-356.
    • (2005) LNCS , vol.3570 , pp. 341-356
    • Abdalla, M.1    Pointcheval, D.2
  • 3
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Y. Ding and P. Horster, "Undetectable on-line password guessing attacks," ACM Operating Systems Review, Vol. 29, 1995, pp. 77-86.
    • (1995) ACM Operating Systems Review , vol.29 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 4
    • 0035701459 scopus 로고    scopus 로고
    • Three-party Encrypted Key Exchange without server public-keys
    • DOI 10.1109/4234.974498, PII S1089779801110720
    • C. L. Lin, H. M. Sun, M. Steiner, and T. Hwang, "Three-party encrypted key exchange without server public-keys," IEEE Communication Letters, Vol. 5, 2001, pp. 497-499. (Pubitemid 34099691)
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.-L.1    Sun, H.-M.2    Steiner, M.3    Hwang, T.4
  • 5
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • C. C. Chang and Y. F. Chang, "A novel three-party encrypted key exchange protocol," Computer Standards and Interfaces, Vol. 26, 2004, pp. 471-476.
    • (2004) Computer Standards and Interfaces , vol.26 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 6
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • H. M. Sun, B. C. Chen, and T. Hwang, "Secure key agreement protocols for three-party against guessing attacks," Journal of Systems and Software, Vol. 75, 2005, pp. 63-68.
    • (2005) Journal of Systems and Software , vol.75 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 7
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without server's public key
    • S. W. Lee, H. S. Kim, and K. Y Yoo, "Efficient verifier-based key agreement protocol for three parties without server's public key," Applied Mathematics and Computation, Vol. 167,2005, pp. 996-1003.
    • (2005) Applied Mathematics and Computation , vol.167 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 8
    • 34248672528 scopus 로고    scopus 로고
    • Efficient verifier-based password-authenticated key exchange in the three-party setting
    • DOI 10.1016/j.csi.2006.12.002, PII S0920548906001395
    • J. O. Kwon, I. R. Jeong, K. Sakurai, and D. H. Lee, "Efficient verifier based password-authenticated key exchange in the three-party setting," Computer Standards and Interfaces, Vol. 29, 2007, pp. 513-520. (Pubitemid 46771127)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.5 , pp. 513-520
    • Kwon, J.O.1    Jeong, I.R.2    Sakurai, K.3    Lee, D.H.4
  • 10
    • 56549092690 scopus 로고    scopus 로고
    • Verifier-based password-authenticated key exchange protocol for three-party (In Chinese)
    • W. M. Li, Q. Y. Wen, and H. Zhang, "Verifier-based password-authenticated key exchange protocol for three-party (In Chinese)," TongxinXuebao/Journal on Communication, Vol. 29, 2008, pp. 149-152.
    • (2008) TongxinXuebao/Journal on Communication,. , vol.29 , pp. 149-152
    • Li, W.M.1    Wen, Q.Y.2    Zhang, H.3
  • 11
    • 12244259085 scopus 로고    scopus 로고
    • Improvement of Lee and Lee's authenticated key agreement scheme
    • S. W. Lee, H. S. Kim, and K. Y. Yoo, "Improvement of Lee and Lee's authenticated key agreement scheme," Applied Mathematics and Computation, Vol. 162, 2005, pp. 1049-1053.
    • (2005) Applied Mathematics and Computation,. , vol.162 , pp. 1049-1053
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 14
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • N. Koblitz, "Elliptic curve cryptosystem," Mathematics of Computation, Vol. 48, 1987, pp. 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 17
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • in Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
    • P. S. L. M. Barreto, H. Y. Kim, and B. Lynn, "Efficient algorithms for pairing-based cryptosystems," in Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, LNCS 2442, 2002, pp. 354-369.
    • (2002) LNCS , vol.2442 , pp. 354-369
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3
  • 20
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • in Proceedings of the 19th International Conference on Theory and Application of Cryptographic Techniques
    • M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," in Proceedings of the 19th International Conference on Theory and Application of Cryptographic Techniques, LNCS 1807, 2000, pp. 139-155.
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 21
    • 35048866891 scopus 로고    scopus 로고
    • New security results on encrypted key exchange
    • in Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography
    • E. Bresson, O. Chevassut, and D. Pointcheval, "New security results on encrypted key exchange," in Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, LNCS 2947, 2004, pp. 145-158.
    • (2004) LNCS , vol.2947 , pp. 145-158
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 22
    • 84937579774 scopus 로고    scopus 로고
    • The oracle Diffie-Hellman assumptions and an analysis of DHIES
    • in Proceedings of the Cryptographers'" Track at RSA Conference
    • M. Abdalla, M. Bellare, and P. Rogaway, "The oracle Diffie-Hellman assumptions and an analysis of DHIES," in Proceedings of the Cryptographers'" Track at RSA Conference, LNCS 2020, 2001, pp. 143-158.
    • (2001) LNCS , vol.2020 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 23
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols
    • in Proceedings of the Cryptographers' Track at the RSA Conference
    • M. Abdalla and D. Pointcheval, "Simple password-based encrypted key exchange protocols," in Proceedings of the Cryptographers' Track at the RSA Conference, LNCS 3376, 2005 pp. 191-208.
    • (2005) LNCS , vol.3376 , pp. 191-208
    • Abdalla, M.1    Pointcheval, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.