메뉴 건너뛰기




Volumn 10, Issue 3, 2013, Pages

Enhancements of a three-party password-based authenticated key exchange protocol

Author keywords

Authenticated key exchange; Dictionary attack; Password based; Three party

Indexed keywords


EID: 84862680843     PISSN: 16833198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (21)

References (24)
  • 2
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Full version appeared in IEE Information Security, Vol. 153(1), 2006, pp. 27-39
    • Abdalla M., Fouque P. and Pointcheval D., "Password-based authenticated key exchange in the three-party setting," in Proc. of PKC'2005, LNCS 3386, 2005, pp. 65-84. Full version appeared in IEE Information Security, Vol. 153(1), 2006, pp. 27-39.
    • (2005) Proc. of PKC'2005, LNCS 3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.2    Pointcheval, D.3
  • 4
    • 26444476977 scopus 로고    scopus 로고
    • Interactive Diffie-Hellman Assumptions with Applications to Password-based Authentication
    • LNCS 3570
    • Abdalla M. and Pointcheval D., "Interactive Diffie-Hellman Assumptions with Applications to Password-based Authentication," in Proc. Of FC'2005, LNCS 3570, 2005, pp. 341-356.
    • (2005) Proc. of FC'2005 , pp. 341-356
    • Abdalla, M.1    Pointcheval, D.2
  • 5
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • IEEE Computer Society Press
    • Bellovin S. and Merritt M., "Encrypted key exchange: Password-based protocols secure against dictionary attacks," in Proc. of IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1992, pp. 72-84.
    • (1992) Proc. of IEEE Symposium On Security and Privacy , pp. 72-84
    • Bellovin, S.1    Merritt, M.2
  • 7
    • 35048866891 scopus 로고    scopus 로고
    • New security results on encrypted key exchange
    • LNCS 2947
    • Bresson E., Chevassut O., and Pointcheval D., "New security results on encrypted key exchange," in Proc. PKC 2004, LNCS 2947, 2004, pp. 145-158.
    • (2004) Proc. PKC 2004 , pp. 145-158
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 8
    • 33646805409 scopus 로고    scopus 로고
    • Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
    • LNCS 3788
    • Choo K., Boyd C. and Hitchcock Y., "Examining Indistinguishability-Based Proof Models for Key Establishment Protocols," in Proc. of ASIACRYPT'2005, LNCS 3788, 2005, pp. 585-604.
    • (2005) Proc. of ASIACRYPT'2005 , pp. 585-604
    • Choo, K.1    Boyd, C.2    Hitchcock, Y.3
  • 9
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • Chung H., Ku W., "Three weaknesses in a simple three-party key exchange protocol," Information Science, Vol. 178, 2008, pp. 220-229.
    • (2008) Information Science , vol.178 , pp. 220-229
    • Chung, H.1    Ku, W.2
  • 10
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • Guo H., Li Z., Mu Y. and Zhang X., "Cryptanalysis of simple three-party key exchange protocol," Computers and Security, Vo. 27, 2008, pp. 16-21.
    • (2008) Computers and Security , vol.27 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 12
    • 68049147074 scopus 로고    scopus 로고
    • A simple three-party password-based key exchange protocol
    • Huang H., A simple three-party password-based key exchange protocol. International Journal of Communications and Systems, Vol. 22(7), 2009, pp. 857-862.
    • (2009) International Journal of Communications and Systems , vol.22 , Issue.7 , pp. 857-862
    • Huang, H.1
  • 13
    • 58049215501 scopus 로고    scopus 로고
    • Enhanced password-based simple three-party key exchange protocol
    • Kim H. and Choi J., "Enhanced password-based simple three-party key exchange protocol," Computers and Electrical Engineering, Vol. 35, 2009, pp. 107-114.
    • (2009) Computers and Electrical Engineering , vol.35 , pp. 107-114
    • Kim, H.1    Choi, J.2
  • 14
    • 0036825859 scopus 로고    scopus 로고
    • Pretty-simple password-authenticated key-exchange under standard assumptions
    • Kobara K. and Imai H., "Pretty-simple password-authenticated key-exchange under standard assumptions," IEICE Transactions, E85-A(10), 2002, pp. 2229-2237. Also available at http://eprint.iacr.org/2003/038/.
    • (2002) IEICE Transactions , vol.E85-A , Issue.10 , pp. 2229-2237
    • Kobara, K.1    Imai, H.2
  • 15
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server's public keys
    • Lee T., Hwang T., Lin C., "Enhanced three-party encrypted key exchange without server's public keys," Computers and Security, Vol. 23(7), 2004, pp. 571-577.
    • (2004) Computers and Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.1    Hwang, T.2    Lin, C.3
  • 16
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement for three parties without server's public key
    • Lee S., Kim H., Yoo K., "Efficient verifier-based key agreement for three parties without server's public key," Applied Mathematics and Computation, Vol. 167(2), 2005, pp. 996-1003.
    • (2005) Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.1    Kim, H.2    Yoo, K.3
  • 17
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange attacks and a solution
    • Lin C., Sun H. and Hwang T., "Three-party encrypted key exchange attacks and a solution," ACM Operating Systems Review, Vol. 34(4), 2000, pp. 12-20.
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.1    Sun, H.2    Hwang, T.3
  • 18
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server's public keys
    • Lin C., Sun H., Steiner M., and Hwang T., "Three-party encrypted key exchange without server's public keys," IEEE Communications Letters, Vol. 5(12), 2001, pp. 497-499.
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.1    Sun, H.2    Steiner, M.3    Hwang, T.4
  • 19
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu R. and Cao Z., "Simple three-party key exchange protocol," Computers and Security, Vol. 26, 2007, pp. 94-97.
    • (2007) Computers and Security , vol.26 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 21
    • 63649090970 scopus 로고    scopus 로고
    • An off-line dictionary attack on a simple threeparty key exchange protocol
    • Nam J., Paik J., Kang H., Kim U. and Won D., "An off-line dictionary attack on a simple threeparty key exchange protocol," IEEE Communications Letters, Vol. 13(3), 2009, pp. 205-207.
    • (2009) IEEE Communications Letters , vol.13 , Issue.3 , pp. 205-207
    • Nam, J.1    Paik, J.2    Kang, H.3    Kim, U.4    Won, D.5
  • 22
    • 42649086478 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol (S- 3PAKE)
    • Phan R., Yau W., Goi B., "Cryptanalysis of simple three-party key exchange protocol (S- 3PAKE)," Information Science, Vol. 178, 2008, pp. 2849-2856.
    • (2008) Information Science , vol.178 , pp. 2849-2856
    • Phan, R.1    Yau, W.2    Goi, B.3
  • 23
    • 84971660027 scopus 로고    scopus 로고
    • Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols
    • LNCS 4329
    • Wang W. and Hu L., "Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols," in Proc. of INDOCRYPT 2006, LNCS 4329, 2006, pp. 118-132.
    • (2006) Proc. of INDOCRYPT 2006 , pp. 118-132
    • Wang, W.1    Hu, L.2
  • 24
    • 79953304485 scopus 로고    scopus 로고
    • Cryptanalysis of a simple three-party password-based key exchange protocol
    • Article first published online: 12 JUL 2010
    • Yoon E. and Yoo K., Cryptanalysis of a simple three-party password-based key exchange protocol, International Journal of Communication Systems, Vol. 24(4), pp. 532-542, 2011. (Article first published online: 12 JUL 2010).
    • (2011) International Journal of Communication Systems , vol.24 , Issue.4 , pp. 532-542
    • Yoon, E.1    Yoo, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.