메뉴 건너뛰기




Volumn 215, Issue , 2012, Pages 83-96

Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol

Author keywords

Authenticated key exchange; Dictionary attack; Password based; Three party

Indexed keywords

AUTHENTICATED KEY EXCHANGE; DICTIONARY ATTACK; PASSWORD AUTHENTICATED KEY EXCHANGE PROTOCOLS; PASSWORD-BASED; THREE-PARTY;

EID: 84864760957     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2012.06.005     Document Type: Article
Times cited : (30)

References (47)
  • 1
    • 84937579774 scopus 로고    scopus 로고
    • The oracle Diffie-Hellman assumptions and an analysis of DHIES
    • M. Abdalla, M. Bellare, P. Rogaway, The oracle Diffie-Hellman assumptions and an analysis of DHIES, in: Proceedings of CT-RSA'01, 2001, pp. 143-158.
    • (2001) Proceedings of CT-RSA'01 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 2
    • 33845208188 scopus 로고    scopus 로고
    • Provably secure password-based authentication in TLS
    • M. Abdalla, E. Bresson, O. Chevassut, B. Möller, D. Pointcheval, Provably secure password-based authentication in TLS, in: Proceedings of AsiaCCS'06, 2006, pp. 35-45.
    • (2006) Proceedings of AsiaCCS'06 , pp. 35-45
    • Abdalla, M.1
  • 6
    • 26444476977 scopus 로고    scopus 로고
    • Interactive Diffie-Hellman assumptions with Applications to Password-based Authentication
    • LNCS 3570
    • M. Abdalla, D. Pointcheval, Interactive Diffie-Hellman assumptions with Applications to Password-based Authentication, in: Proceedings of FC'05, LNCS 3570, 2005, pp. 341-356.
    • (2005) Proceedings of FC'05 , pp. 341-356
    • Abdalla, M.1    Pointcheval, D.2
  • 12
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • C.C. Chang, and Y.F. Chang A novel three-party encrypted key exchange protocol Computer Standards & Interfaces 26 5 2004 471 476
    • (2004) Computer Standards & Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 13
    • 77958095782 scopus 로고    scopus 로고
    • A communication-efficient three-party password authenticated key exchange protocol
    • 10.1016/j.ins.2010.08.032
    • T.-Y. Chang, M-S. Hwang, and W-P. Yang A communication-efficient three-party password authenticated key exchange protocol Information Sciences 2010 10.1016/j.ins.2010.08.032
    • (2010) Information Sciences
    • Chang, T.-Y.1    Hwang, M.-S.2    Yang, W.-P.3
  • 14
    • 35448940560 scopus 로고    scopus 로고
    • Security enhancement for a three-party encrypted key exchange protocol against undectectable on-line password guessing attacks
    • H.B. Chen, T.H. Chen, W.B. Lee, and C.C. Chang Security enhancement for a three-party encrypted key exchange protocol against undectectable on-line password guessing attacks Computer Standards & Interfaces 30 1-2 2008 95 99
    • (2008) Computer Standards & Interfaces , vol.30 , Issue.12 , pp. 95-99
    • Chen, H.B.1    Chen, T.H.2    Lee, W.B.3    Chang, C.C.4
  • 15
    • 69649092978 scopus 로고    scopus 로고
    • Provably secure password-based three-party key exchange with optimal message steps
    • H.Y. Chien, and T.C. Wu Provably secure password-based three-party key exchange with optimal message steps Computer Journal 52 6 2009 646 655
    • (2009) Computer Journal , vol.52 , Issue.6 , pp. 646-655
    • Chien, H.Y.1    Wu, T.C.2
  • 16
    • 33646805409 scopus 로고    scopus 로고
    • Examining indistinguishability-based proof models for key establishment protocols
    • LNCS 3788
    • K.-K.R. Choo, C. Boyd, Y. Hitchcock, Examining indistinguishability-based proof models for key establishment protocols, in: Proceedings of ASIACRYPT'05, LNCS 3788, 2005, pp. 585-604.
    • (2005) Proceedings of ASIACRYPT'05 , pp. 585-604
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 17
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • H.R. Chung, and W.C. Ku Three weaknesses in a simple three-party key exchange protocol Information Sciences 178 1 2008 220 229
    • (2008) Information Sciences , vol.178 , Issue.1 , pp. 220-229
    • Chung, H.R.1    Ku, W.C.2
  • 18
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Y. Ding, and P. Horster Undetectable on-line password guessing attacks ACM Operating Systems Review 29 4 1995 77 86
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 26
    • 58049215501 scopus 로고    scopus 로고
    • Enhanced password-based simple three-party key exchange protocol
    • H.S. Kim, and J.Y. Choi Enhanced password-based simple three-party key exchange protocol Computers & Electrical Engineering 35 1 2009 107 114
    • (2009) Computers & Electrical Engineering , vol.35 , Issue.1 , pp. 107-114
    • Kim, H.S.1    Choi, J.Y.2
  • 27
  • 28
    • 0033157651 scopus 로고    scopus 로고
    • An improvement of the password-based authentication protocol K1P on security against replay attacks
    • T. Kwon, M. Kang, S. Jung, and J. Song An improvement of the password-based authentication protocol K1P on security against replay attacks IEICE Transactions on Communications E82-B 7 1999 991 997
    • (1999) IEICE Transactions on Communications , vol.82 E -B , Issue.7 , pp. 991-997
    • Kwon, T.1    Kang, M.2    Jung, S.3    Song, J.4
  • 29
    • 76349117227 scopus 로고    scopus 로고
    • Simple password-based three-party authenticated key exchange without server public keys
    • 10.1016/j.ins.2010.01.005
    • T.-F. Lee, and T. Hwang Simple password-based three-party authenticated key exchange without server public keys Information Sciences 2010 10.1016/j.ins.2010.01.005
    • (2010) Information Sciences
    • Lee, T.-F.1    Hwang, T.2
  • 30
    • 8344221264 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • T.F. Lee, T. Hwang, and C.L. Lin A novel three-party encrypted key exchange protocol Computers & Security 23 2004 571 577
    • (2004) Computers & Security , vol.23 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 32
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution
    • C.L. Lin, H.M. Sun, and T. Hwang Three-party encrypted key exchange: attacks and a solution ACM Operating Systems Review 34 4 2000 12 20
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 33
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • C.L. Lin, H.M. Sun, M. Steiner, and T. Hwang Three-party encrypted key exchange without server public-keys IEEE Communications Letters 5 12 2001 497 499
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 34
    • 10444279176 scopus 로고    scopus 로고
    • Provably secure threeparty password-authenticated key exchange
    • C.L. Lin, H.A. Wen, T. Hwang, and H.M. Sun Provably secure threeparty password-authenticated key exchange IEICE Transaction On Fundamentals E87-A 11 2004 2990 3000
    • (2004) IEICE Transaction on Fundamentals , vol.87 E -A , Issue.11 , pp. 2990-3000
    • Lin, C.L.1    Wen, H.A.2    Hwang, T.3    Sun, H.M.4
  • 36
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • R. Lu, and Z. Cao Simple three-party key exchange protocol Computers & Security 26 1 2007 94 97
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 38
    • 63649090970 scopus 로고    scopus 로고
    • An off-line dictionary attack on a simple three-party key exchange protocol
    • J. Nam, J. Paik, H.K. Kang, U.M. Kim, and D. Won An off-line dictionary attack on a simple three-party key exchange protocol IEEE Communications Letters 13 3 2009 205 207
    • (2009) IEEE Communications Letters , vol.13 , Issue.3 , pp. 205-207
    • Nam, J.1    Paik, J.2    Kang, H.K.3    Kim, U.M.4    Won, D.5
  • 39
    • 77958106074 scopus 로고    scopus 로고
    • A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol
    • J. Nam, J. Paik, and D. Won A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol Information Sciences 181 1 2011 234 238
    • (2011) Information Sciences , vol.181 , Issue.1 , pp. 234-238
    • Nam, J.1    Paik, J.2    Won, D.3
  • 40
    • 84937389342 scopus 로고    scopus 로고
    • The gap-problems: A new class of problems for the security of cryptographic schemes
    • T. Okamoto, D. Pointcheval, The gap-problems: a new class of problems for the security of cryptographic schemes, in: Proceedings of PKC'01, 2001, pp. 104-118.
    • (2001) Proceedings of PKC'01 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 43
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • H.M. Sun, B.C. Chen, and T. Hwang Secure key agreement protocols for three-party against guessing attacks Journal of Systems and Software 75 1-2 2005 63 68
    • (2005) Journal of Systems and Software , vol.75 , Issue.12 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 44
    • 21644467750 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol using weil pairing
    • H.A. Wen, T.F. Lee, and T. Hwang Provably secure three-party password-based authenticated key exchange protocol using weil pairing IEE Proceedings - Communications 152 2 2005 138 143
    • (2005) IEE Proceedings - Communications , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.A.1    Lee, T.F.2    Hwang, T.3
  • 45
    • 1842478681 scopus 로고    scopus 로고
    • Password-based user authentication and key distribution protocols for client-server applications
    • H.T. Yeh, and H.M. Sun Password-based user authentication and key distribution protocols for client-server applications Journal of Systems and Software 72 1 2004 97 103
    • (2004) Journal of Systems and Software , vol.72 , Issue.1 , pp. 97-103
    • Yeh, H.T.1    Sun, H.M.2
  • 46
    • 80055041764 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol
    • J. Zhao, and Dawu Gu Provably secure three-party password-based authenticated key exchange protocol Information Sciences 184 1 2012 310 323
    • (2012) Information Sciences , vol.184 , Issue.1 , pp. 310-323
    • Zhao, J.1    Gu, D.2
  • 47
    • 79960186888 scopus 로고    scopus 로고
    • Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
    • 10.1016/j.ins.2011.05.009
    • L. Zhang, Q. Wu, B. Qin, and J. Domingo-Ferrer Provably secure one-round identity-based authenticated asymmetric group key agreement protocol Information Sciences 2011 10.1016/j.ins.2011.05.009
    • (2011) Information Sciences
    • Zhang, L.1    Wu, Q.2    Qin, B.3    Domingo-Ferrer, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.