메뉴 건너뛰기




Volumn 6, Issue 6, 2010, Pages 2468-2484

A practical three-party authenticated key exchange protocol

Author keywords

Authentication; Cryptanaly sis; Man in the middle attack; Password guessing attacks; Security; Three party key exchange protocol (3PAKE)

Indexed keywords

CRYPTANALY-SIS; MAN IN THE MIDDLE ATTACKS; PASSWORD GUESSING ATTACK; SECURITY; THREE-PARTY;

EID: 80052537663     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (30)
  • 2
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • C. C. Chang and Y. F. Chang, A novel three-party encrypted key exchange protocol, Computer Standards and Interfaces, vol.26, no.5, pp.471-476, 2004.
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 3
    • 47549109760 scopus 로고    scopus 로고
    • A round- and computation- efficient three-party authenti-cated key exchange protocol
    • T. H. Chen, W. B. Lee and H. B. Chen, A round- and computation- efficient three-party authenti-cated key exchange protocol, Journal of Systems and Software, vol.81, no.9, pp.1581-1590, 2008.
    • (2008) Journal of Systems and Software , vol.81 , Issue.9 , pp. 1581-1590
    • Chen, T.H.1    Lee, W.B.2    Chen, H.B.3
  • 4
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • H. R. Chung and W. C. Ku, Three weaknesses in a simple three-party key exchange protocol, Information Science, vol.178, no.1, pp.220-229, 2008.
    • (2008) Information Science , vol.178 , Issue.1 , pp. 220-229
    • Chung, H.R.1    Ku, W.C.2
  • 5
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Y. Ding and P. Horster, Undetectable on-line password guessing attacks, ACM Operating Systems Review, vol.29, no.4, pp.77-86, 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 6
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • H. Guo, Z. Li, Y. Mu and X. Zhang, Cryptanalysis of simple three-party key exchange protocol, Computers and Security, vol.27, no.1-2, pp.16-21, 2008.
    • (2008) Computers and Security , vol.27 , Issue.1-2 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 7
    • 74549221711 scopus 로고    scopus 로고
    • An efficient protocol for authenticated key agreement, Designs
    • L. Law, A. Menezes, M. Qu, J. Solinas and S. Vanstone, An efficient protocol for authenticated key agreement, Designs, Codes and Cryptography, vol.28, no.2, pp.119-134, 2003.
    • (2003) Codes and Cryptography , vol.28 , Issue.2 , pp. 119-134
    • Law, L.1    Menezes, A.2    Qu, M.3    Solinas, J.4    Vanstone, S.5
  • 8
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • T. F. Lee, T. Hwang and C. L. Lin, Enhanced three-party encrypted key exchange without server public keys, Computers and Security, vol.23, no.7, pp.571-577, 2004.
    • (2004) Computers and Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 9
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without server's public key
    • S. W. Lee, H. S. Kim and K. Y. Yoo. Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation, vol.167, no.2, pp.996-1003, 2005.
    • (2005) Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 10
    • 0008145442 scopus 로고    scopus 로고
    • Three party-encrypted key exchange: Attacks and a solution
    • C. L. Lin, H. M. Sun and T. Hwang, Three party-encrypted key exchange: attacks and a solution, ACM Operating Systems Review, vol.34, no.4, pp.12-20, 2000.
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 11
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server pub-lic-keys
    • C. L. Lin, H. M. Sun, M. Steiner and T. Hwang, Three-party encrypted key exchange without server pub-lic-keys, IEEE Communication Letters, vol.5, no.12, pp.497-499, 2001.
    • (2001) IEEE Communication Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 12
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • R. X. Lu and Z. F. Cao, Simple three-party key exchange protocol, Computers and Security, vol.26, no.1, pp.94-97, 2007.
    • (2007) Computers and Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.X.1    Cao, Z.F.2
  • 13
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • J. Nam, Y. Lee, S. Kim and D. Won, Security weakness in a three-party pairing-based protocol for password authenticated key exchange, Information Sciences, vol.177, no.6, pp.1364-1375, 2007.
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 14
    • 42649086478 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
    • C. W. Phan Raphael and W. C. Yau and B. M. Goi, Cryptanalysis of simple three-party key exchange protocol (S-3PAKE), Information Science, vol.178, no.13, pp.2849-2856, 2008.
    • (2008) Information Science , vol.178 , Issue.13 , pp. 2849-2856
    • Phan, R.C.W.1    Yau, W.C.2    Goi, B.M.3
  • 15
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudik and M. Waidner, Refinement and extension of encrypted key exchange, ACM Operating Systems Review, vol.29, no.3, pp.22-30, 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 16
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • H. M. Sun, B. C. Chen and T. Hwang, Secure key agreement protocols for three-party against guessing attacks, Journal of Systems and Software, vol.75, no.1-2, pp.63-68, 2005.
    • (2005) Journal of Systems and Software , vol.75 , Issue.1-2 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 17
    • 21644467750 scopus 로고    scopus 로고
    • Provably Secure Three-party Password-based Authenticated Key Exchange Protocol Using Weil Pairing
    • H. A. Wen, T. F. Lee and T. Hwang, Provably secure three-party password-based authenticated key exchange protocol using Weil pairing, IEE Proceedings-Communications, vol.152, no.2, pp.138-143, 2005.
    • (2005) IEE Proceedings-Communications , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.A.1    Lee, T.F.2    Hwang, T.3
  • 20
    • 48249121784 scopus 로고    scopus 로고
    • Collision detection and estimation of its spot for a flexible beam using ratio of mode functions
    • Y. Sawada, and T. Sako, Collision detection and estimation of its spot for a flexible beam using ratio of mode functions, International Journal of Innovative Computing, Information and Control, vol.2, no.5, pp.1027-1038, 2005.
    • (2005) International Journal of Innovative Computing, Information and Control , vol.2 , Issue.5 , pp. 1027-1038
    • Sawada, Y.1    Sako, T.2
  • 21
    • 61749094001 scopus 로고    scopus 로고
    • Fuzzy control of active queue management routers for transmission con-trol protocol networks via time-delay affine Takagi-Sugeno fuzzy models
    • H. Chu, K. Tsai and W. Chang, Fuzzy control of active queue management routers for transmission con-trol protocol networks via time-delay affine Takagi-Sugeno fuzzy models, International Journal of Innovative Computing, Information and Control, vol.4, no.2, pp.291-312, 2008.
    • (2008) International Journal of Innovative Computing, Information and Control , vol.4 , Issue.2 , pp. 291-312
    • Chu, H.1    Tsai, K.2    Chang, W.3
  • 23
    • 48249127045 scopus 로고    scopus 로고
    • Analysis of the robustness of the pressure-based individual identification system based on neural networks
    • L. Mi and F. Takeda, Analysis of the robustness of the pressure-based individual identification system based on neural networks, International Journal of Innovative Computing, Information and Control, vol.3, no.1, pp.97-110, 2007.
    • (2007) International Journal of Innovative Computing, Information and Control , vol.3 , Issue.1 , pp. 97-110
    • Mi, L.1    Takeda, F.2
  • 27
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • B. C. Neuman and T. Ts'o', Kerberos: An authentication service for computer networks, IEEE Communications Magazine, vol.32, no.9, pp.33-38, 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o', T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.