메뉴 건너뛰기




Volumn 27, Issue 4, 2011, Pages 1487-1501

Secure verifier-based Three-Party key exchange in the random oracle model

Author keywords

Authentication; Guessing attacks; Key agreement; Password; Three party password authenticated key exchange protocol

Indexed keywords

DIFFIE-HELLMAN PROBLEM; DISTRIBUTED ENVIRONMENTS; GUESSING ATTACKS; INDISTINGUISHABILITY; KEY AGREEMENT; KEY EXCHANGE; PASSWORD; PASSWORD AUTHENTICATED KEY EXCHANGE PROTOCOLS; PROVABLY SECURE; RANDOM ORACLE MODEL; SESSION KEY; THREE-PARTY; VERIFIER-BASED;

EID: 80051506042     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (14)

References (17)
  • 1
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • LNCS 1807
    • M. Bellare, D. Pointcheval, and P. R ogaway, "Authenticated key exchange secure against dictionary attacks," in Proceedings of Eurocrypt, LNCS 1807, 2000, pp. 139-155.
    • (2000) Proceedings of Eurocrypt , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Ogaway, P.R.3
  • 2
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • C. C. Chang and Y. F. Chang, "A novel three-party encrypted key exchange protocol," Computer Standards and Interfaces, Vol. 26, 2004, pp. 471-476.
    • (2004) Computer Standards and Interfaces , vol.26 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 3
    • 46749107236 scopus 로고    scopus 로고
    • Selectively convertible authenticated encryption in the random oracle model
    • H. Y. Chien, "Selectively convertible authenticated encryption in the random oracle model," The Computer Journal, Vol. 51, 2008, pp. 419-434.
    • (2008) The Computer Journal , vol.51 , pp. 419-434
    • Chien, H.Y.1
  • 4
    • 36349005859 scopus 로고    scopus 로고
    • Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
    • N. Y. Lee, C. N. Wu, and C. C. Wang, "Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings," Computers and Electrical Engineering, Vol. 34, 2008, pp. 12-20.
    • (2008) Computers and Electrical Engineering , vol.34 , pp. 12-20
    • Lee, N.Y.1    Wu, C.N.2    Wang, C.C.3
  • 5
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • H. R. Chung and W. C. Ku, "Three weaknesses in a simple three-party key exchange protocol," Information Sciences, Vol. 178, 2008, pp. 220-229.
    • (2008) Information Sciences , vol.178 , pp. 220-229
    • Chung, H.R.1    Ku, W.C.2
  • 6
    • 80051514472 scopus 로고    scopus 로고
    • Undetectable on-line password guessi ng attacks
    • Y. Ding and P. Horster, "Undetectable on-line password guessi ng attacks," ACM Operating System Review, Vol. 34, 2000, pp. 12-20.
    • (2000) ACM Operating System Review , vol.34 , pp. 12-20
    • Ding, Y.1    Horster, P.2
  • 7
    • 8344221264 scopus 로고    scopus 로고
    • E nhanced three-party encrypted key exchange without server public keys
    • T. F. Lee, T. Hwang, and C. L. Lin, "E nhanced three-party encrypted key exchange without server public keys," Computers and Security, Vol. 23, 2004, pp. 571-577.
    • (2004) Computers and Security , vol.23 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 8
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without server's public key
    • S. W. Lee, H. S. Kim, and K. Y. Yoo, "Efficient verifier-based key agreement protocol for three parties without server's public key," Applied Mathematics and Computation, Vol. 167, 2005, pp. 996-1003.
    • (2005) Applied Mathematics and Computation , vol.167 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 9
    • 0008145442 scopus 로고    scopus 로고
    • T hree party-encrypted key exchange: Attacks and a solution
    • C. L. Lin, H. M. Sun, and T. Hwang, "T hree party-encrypted key exchange: attacks and a solution," ACM Operating System Review, Vol. 34, 2000, pp. 12-20.
    • (2000) ACM Operating System Review , vol.34 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 10
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key ex-change without server public-keys
    • C. L. Lin, H. M. Sun, M. Steiner, and T. Hwang, "Three-party encrypted key ex-change without server public-keys," IEEE Communications Letter, Vol. 5, 2001, pp. 497-479.
    • (2001) IEEE Communications Letter , vol.5 , pp. 497-1479
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 11
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • R. Lu and Z. Cao, "Simple three-party key exchange protocol," Computers and Security, Vol. 26, 2007, pp. 94-97.
    • (2007) Computers and Security , vol.26 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 12
  • 13
    • 69649092978 scopus 로고    scopus 로고
    • Provably secure password-based three-party key ex-change with optimal message steps
    • H. Y. Chien and T. C. Wu, "Provably secure password-based three-party key ex-change with optimal message steps," The Computer Journal, Vol. 52, 2009, pp. 646-655.
    • (2009) The Computer Journal , vol.52 , pp. 646-655
    • Chien, H.Y.1    Wu, T.C.2
  • 14
    • 34248672528 scopus 로고    scopus 로고
    • Efficient verifier-based password-authenticated key exchange in the three-party setting
    • DOI 10.1016/j.csi.2006.12.002, PII S0920548906001395
    • J. O. Kwon, I. R. Jeong, K. Sakurai, and D. H. Lee, "Efficient verifier-based password-authenticated key exchange in the three-party setting," Computer Standards and Interfaces, Vol. 29, 2007, pp. 513-520. (Pubitemid 46771127)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.5 , pp. 513-520
    • Kwon, J.O.1    Jeong, I.R.2    Sakurai, K.3    Lee, D.H.4
  • 15
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellm an
    • LNCS 1838
    • A. Joux, "A one round protocol for tripartite Diffie-Hellm an," in Proceedings of Algorithmic Number Theory Symposium, LNCS 1838, 2000, pp. 385-394.
    • (2000) Proceedings of Algorithmic Number Theory Symposium , pp. 385-394
    • Joux, A.1
  • 17
    • 68949161753 scopus 로고    scopus 로고
    • An efficient three-party authenti cated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    • J. H. Yang and C. C. Chang, "An efficient three-party authenti cated key exchange protocol using elliptic curve cryptography for mobile-commerce environments," Journal of Systems and Software, Vol. 82, 2009, pp. 1497-1502.
    • (2009) Journal of Systems and Software , vol.82 , pp. 1497-1502
    • Yang, J.H.1    Chang, C.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.