메뉴 건너뛰기




Volumn 25, Issue 11, 2012, Pages 1443-1449

Cryptanalysis of an efficient three-party password-based key exchange scheme

Author keywords

cryptanalysis; key compromise impersonation; offline password guessing; password authenticated key exchange; three party

Indexed keywords

CRYPTANALYSIS; KEY-COMPROMISE IMPERSONATION; OFFLINE PASSWORDS; PASSWORD-AUTHENTICATED KEY EXCHANGE; THREE-PARTY;

EID: 84868193789     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.1373     Document Type: Article
Times cited : (12)

References (21)
  • 1
  • 2
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols
    • Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
    • Abdalla M, Pointcheval D, Supérieure ÃN,. Simple password-based encrypted key exchange protocols. In Topics in Cryptology: CT-RSA'05, Vol. 3376, Lecture Notes in Computer Science, Springer-Verlag: Berlin, Heidelberg, 2005; 191-208, DOI: 10.1007/978-3-540-30574-3-14. (Pubitemid 41231212)
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 191-208
    • Abdalla, M.1    Pointcheval, D.2
  • 3
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • DOI: 10.1109/RISP.1992.213269.
    • Bellovin SM, Merritt M,. Encrypted key exchange: password-based protocols secure against dictionary attacks. IEEE Symposium on Security and Privacy 1992: 72. DOI: 10.1109/RISP.1992.213269.
    • (1992) IEEE Symposium on Security and Privacy , pp. 72
    • Bellovin, S.M.1    Merritt, M.2
  • 4
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • Cryptography and Coding
    • Blake-Wilson S, Johnson D, Menezes A,. Key agreement protocols and their security analysis. Proceedings of the 6th IMA International Conference on Cryptography and Coding, Springer-Verlag: London, UK, 1997; 30-45. (Pubitemid 128005797)
    • (1997) Lecture Notes in Computer Science , Issue.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 6
    • 77958095782 scopus 로고    scopus 로고
    • A communication-efficient three-party password authenticated key exchange protocol
    • DOI: 10.1016/j.ins.2010.08.032.
    • Chang TY, Hwang MS, Yang WP,. A communication-efficient three-party password authenticated key exchange protocol. Information Sciences 2011; 181: 217-226. DOI: 10.1016/j.ins.2010.08.032.
    • (2011) Information Sciences , vol.181 , pp. 217-226
    • Chang, T.Y.1    Hwang, M.S.2    Yang, W.P.3
  • 7
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • DOI: 10.1016/j.ins.2007.08.004.
    • Chung HR, Ku WC,. Three weaknesses in a simple three-party key exchange protocol. Information Sciences 2008; 178 (1): 220-229. DOI: 10.1016/j.ins.2007. 08.004.
    • (2008) Information Sciences , vol.178 , Issue.1 , pp. 220-229
    • Chung, H.R.1    Ku, W.C.2
  • 8
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • DOI: 10.1016/j.cose.2004.06.007.
    • Lee TF, Hwang T, Lin CL,. Enhanced three-party encrypted key exchange without server public keys. Computers & Security 2004; 23 (7): 571-577. DOI: 10.1016/j.cose.2004.06.007.
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 9
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • DOI 10.1016/j.cose.2006.08.005, PII S0167404806001246
    • Lu R, Cao Z,. Simple three-party key exchange protocol. Computers & Security 2007; 26 (1): 94-97. DOI: 10.1016/j.cose.2006.08.005. (Pubitemid 46216493)
    • (2007) Computers and Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 10
    • 68949161753 scopus 로고    scopus 로고
    • An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    • DOI: 10.1016/j.jss.2009.03.075.
    • Yang JH, Chang CC,. An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Journal of Systems and Software 2009; 82: 1497-1502. DOI: 10.1016/j.jss.2009.03. 075.
    • (2009) Journal of Systems and Software , vol.82 , pp. 1497-1502
    • Yang, J.H.1    Chang, C.C.2
  • 11
    • 79953330802 scopus 로고    scopus 로고
    • Efficient three-party password-based key exchange scheme
    • DOI: 10.1002/dac.1172.
    • Lou DC, Huang HF,. Efficient three-party password-based key exchange scheme. International Journal of Communication Systems 2011; 24 (4): 504-512. DOI: 10.1002/dac.1172.
    • (2011) International Journal of Communication Systems , vol.24 , Issue.4 , pp. 504-512
    • Lou, D.C.1    Huang, H.F.2
  • 13
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • Koblitz N,. Elliptic curve cryptosystem. Mathematics of Computation 1987; 48: 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 14
    • 58549103172 scopus 로고    scopus 로고
    • Efficient and strongly secure password-based server aided key exchange (extended abstract)
    • Springer-Verlag: Berlin, Heidelberg, DOI: 10.1007/978-3-540-89754-5-14
    • Yoneyama K,. Efficient and strongly secure password-based server aided key exchange (extended abstract). Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology, INDOCRYPT'08, Springer-Verlag: Berlin, Heidelberg, 2008; 172-184, DOI: 10.1007/978-3-540- 89754-5-14.
    • (2008) Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology, INDOCRYPT'08 , pp. 172-184
    • Yoneyama, K.1
  • 16
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • In, Springer: Berlin / Heidelberg, DOI: 10.1007/3-540-39200-9-33.
    • Gennaro R, Lindell Y,. A framework for password-based authenticated key exchange. In Eurocrypt'03, Lecture Notes in Computer Science, Vol. 2656, Springer: Berlin / Heidelberg, 2003; 648-648, DOI: 10.1007/3-540-39200-9-33.
    • (2003) Eurocrypt'03, Lecture Notes in Computer Science , vol.2656 , pp. 648-648
    • Gennaro, R.1    Lindell, Y.2
  • 17
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • DOI: 10.1016/j.cose.2008.03.001.
    • Guo H, Li Z, Mu Y, Zhang X,. Cryptanalysis of simple three-party key exchange protocol. Computers & Security 2008; 27 (1-2): 16-21, DOI: 10.1016/j.cose.2008.03.001.
    • (2008) Computers & Security , vol.27 , Issue.12 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 18
    • 63649090970 scopus 로고    scopus 로고
    • An off-line dictionary attack on a simple three-party key exchange protocol
    • DOI: 10.1109/LCOMM.2009.081609.
    • Nam J, Paik J, Kang HK, Kim UM, Won D,. An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Communications Letters 2009; 13: 205-207. DOI: 10.1109/LCOMM.2009.081609.
    • (2009) IEEE Communications Letters , vol.13 , pp. 205-207
    • Nam, J.1    Paik, J.2    Kang, H.K.3    Kim, U.M.4    Won, D.5
  • 19
    • 42649086478 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
    • DOI: 10.1016/j.ins.2008.02.008.
    • Phan RCW, Yau WC, Goi B M,. Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). Information Sciences 2008; 178 (13): 2849-2856. DOI: 10.1016/j.ins.2008.02.008.
    • (2008) Information Sciences , vol.178 , Issue.13 , pp. 2849-2856
    • Phan, R.C.W.1    Yau, W.C.2    Goi, B.M.3
  • 20
    • 77949936896 scopus 로고    scopus 로고
    • Cryptanalysis of a three-party authenticated key exchange protocol using elliptic curve cryptography
    • IEEE Computer Society: Washington, DC, USA, DOI: 10.1109/ICRCCS.2009.11
    • Pu Q, Zhao X, Ding J,. Cryptanalysis of a three-party authenticated key exchange protocol using elliptic curve cryptography. Proceedings of the 2009 International Conference on Research Challenges in Computer Science, ICRCCS '09, IEEE Computer Society: Washington, DC, USA, 2009; 7-10, DOI: 10.1109/ICRCCS.2009.11.
    • (2009) Proceedings of the 2009 International Conference on Research Challenges in Computer Science, ICRCCS '09 , pp. 7-10
    • Pu, Q.1    Zhao, X.2    Ding, J.3
  • 21
    • 79953304485 scopus 로고    scopus 로고
    • Cryptanalysis of a simple three-party password-based key exchange protocol
    • DOI: 10.1002/dac.1168.
    • Yoon EJ, Yoo KY,. Cryptanalysis of a simple three-party password-based key exchange protocol. International Journal of Communication Systems 2011; 24: 532-542. DOI: 10.1002/dac.1168.
    • (2011) International Journal of Communication Systems , vol.24 , pp. 532-542
    • Yoon, E.J.1    Yoo, K.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.