메뉴 건너뛰기




Volumn 23, Issue 12, 2011, Pages 1386-1398

A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card

Author keywords

cross realm; cryptographic protocols; password authenticated key agreement; provable security; smart card

Indexed keywords

CRYPTOGRAPHY; SMART CARDS;

EID: 80051485094     PISSN: 15320626     EISSN: 15320634     Source Type: Journal    
DOI: 10.1002/cpe.1616     Document Type: Article
Times cited : (3)

References (17)
  • 1
    • 26444476977 scopus 로고    scopus 로고
    • Interactive diffie-hellman assumptions with applications to password-based authentication
    • Finacial Cryptography and Data Security: 9th International Conference, FC 2005. Revised Papers
    • Abdalla M, Pointcheval D,. Interactive Diffie-Hellman assumptions with applications to password-based authentication. Proceedings of the FC'05 (Lecture Notes in Computer Science, vol. 3570), Roseau, Dominica, 2005; 341-356. (Pubitemid 41425488)
    • (2005) Lecture Notes in Computer Science , vol.3570 , pp. 341-356
    • Abdalla, M.1    Pointcheval, D.2
  • 2
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
    • Abdalla M, Fouque P, Pointcheval D,. Password-based authenticated key exchange in the three-party setting. Proceedings of the PKC'05 (Lecture Notes in Computer Science, vol. 3386), Switzerland, 2005; 65-84. (Pubitemid 41231326)
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 3
    • 0035701459 scopus 로고    scopus 로고
    • Three-party Encrypted Key Exchange without server public-keys
    • DOI 10.1109/4234.974498, PII S1089779801110720
    • Lin C-L, Sun H-M, Steiner M, Hwang T,. Three-party encrypted key exchange without server public-keys. IEEE Communications Letters 2001; 12 (5): 497-499. (Pubitemid 34099691)
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.-L.1    Sun, H.-M.2    Steiner, M.3    Hwang, T.4
  • 5
    • 79251577196 scopus 로고    scopus 로고
    • A weakness of the password-authenticated key agreement between clients with different passwords scheme
    • Chen L,. A weakness of the password-authenticated key agreement between clients with different passwords scheme. ISO/IEC JTC 1/SC27 N3716.
    • ISO/IEC JTC 1/SC27 N3716
    • Chen, L.1
  • 6
    • 35048872322 scopus 로고    scopus 로고
    • Weakness of a password-authenticated key exchange protocol between clients with different passwords
    • Yellow Mountain, China
    • Wang S, Wang J, Xu M,. Weakness of a password-authenticated key exchange protocol between clients with different passwords. Proceedings of the ACNS'04 (Lecture Notes in Computer Science, vol. 3089), Yellow Mountain, China, 2004; 414-425.
    • (2004) Proceedings of the ACNS'04 (Lecture Notes in Computer Science, 3089) , pp. 414-425
    • Wang, S.1    Wang, J.2    Xu, M.3
  • 7
    • 35048854202 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords
    • Assisi, Italy
    • Kim J, Kim S, Kwak J, Won D,. Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords. Proceedings of the ICCSA 2004 (Lecture Notes in Computer Science, vol. 3043), Assisi, Italy, 2004; 895-902.
    • (2004) Proceedings of the ICCSA 2004 (Lecture Notes in Computer Science, 3043) , pp. 895-902
    • Kim, J.1    Kim, S.2    Kwak, J.3    Won, D.4
  • 8
    • 26444613363 scopus 로고    scopus 로고
    • Cryptanalysis of an improved client-to-client Password-Authenticated Key Exchange (C2C-PAKE) scheme
    • Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
    • Phan RC-W, Goi B-M,. Cryptanalysis of an improved client-to-client password authenticated key exchange (C2C-PAKE) scheme. Proceedings of the ACNS'05 (Lecture Notes in Computer Science, vol. 3531), New York, U.S.A., 2005; 33-39. (Pubitemid 41422106)
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 33-39
    • Phan, R.C.-W.1    Goi, B.-M.2
  • 10
    • 34447321042 scopus 로고    scopus 로고
    • EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
    • DOI 10.1016/j.ins.2007.03.024, PII S0020025507001600
    • Byun JW, Lee DH, Lim JI,. EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. Information Sciences 2007; 177 (19): 3995-4013. (Pubitemid 47058089)
    • (2007) Information Sciences , vol.177 , Issue.19 , pp. 3995-4013
    • Byun, J.W.1    Lee, D.H.2    Lim, J.I.3
  • 14
    • 71549145973 scopus 로고    scopus 로고
    • An efficient and provably secure cross-realm client-to-client password-authenticated key agreement protocol with smart cards
    • Ishikawa, Japan
    • Jin W-T, Xu J,. An efficient and provably secure cross-realm client-to-client password-authenticated key agreement protocol with smart cards. Proceedings of the CANS'09 (Lecture Notes in Computer Science, vol. 5888), Ishikawa, Japan, 2009; 299-314.
    • (2009) Proceedings of the CANS'09 (Lecture Notes in Computer Science, 5888) , pp. 299-314
    • Jin, W.-T.1    Xu, J.2
  • 16
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • Xu J, Zhu W-T, Feng D-G,. An improved smart card based password authentication scheme with provable security. Computer Standards and Interfaces 2009; 31 (4): 723-728.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.-T.2    Feng, D.-G.3
  • 17
    • 62549133356 scopus 로고    scopus 로고
    • Robust and efficient password-authenticated key agreement using smart cards
    • Juang W-S, Chen S-T, Liaw H-T,. Robust and efficient password- authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics 2008; 55 (6): 2551-2556.
    • (2008) IEEE Transactions on Industrial Electronics , vol.55 , Issue.6 , pp. 2551-2556
    • Juang, W.-S.1    Chen, S.-T.2    Liaw, H.-T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.