메뉴 건너뛰기




Volumn 6, Issue 3, 2012, Pages 573-579

A computation-efficient three-party encrypted key exchange protocol

Author keywords

Authentication; Key exchange; Password; Password guessing attacks; Three party encrypted key exchange

Indexed keywords


EID: 84870003598     PISSN: 19350090     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (19)

References (24)
  • 3
    • 48249099653 scopus 로고    scopus 로고
    • A practical three-party encrypted key exchange protocol with round efficiency, International Journal of Innovative Computing
    • Chang, Y.F., A practical three-party encrypted key exchange protocol with round efficiency, International Journal of Innovative Computing, Information and Control, 4(4), (2008), 953-960.
    • (2008) Information and Control , vol.4 , Issue.4 , pp. 953-960
    • Chang, Y.F.1
  • 4
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • Chang, Y.F. and C.C. Chang, A novel three-party encrypted key exchange protocol, Computer Standards & Interfaces, 26(5), (2004), 471-476.
    • (2004) Computer Standards & Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, Y.F.1    Chang, C.C.2
  • 5
    • 35448940560 scopus 로고    scopus 로고
    • Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
    • Chen, H.B., T.H. Chen, W.B. Lee, and C.C. Chang, Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks, Computer Standards & Interfaces, 30, (2008), 95-99.
    • (2008) Computer Standards & Interfaces , vol.30 , pp. 95-99
    • Chen, H.B.1    Chen, T.H.2    Lee, W.B.3    Chang, C.C.4
  • 6
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • Chung, H.R., and W.C. Ku, Three weaknesses in a simple three-party key exchange protocol, Information Sciences, 178(1), (2008), 220-229.
    • (2008) Information Sciences , vol.178 , Issue.1 , pp. 220-229
    • Chung, H.R.1    Ku, W.C.2
  • 8
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding, Y. and P. Horster, Undetectable on-line password guessing attacks, ACM Operating Systems Review, 29(4), (1995), 77-86.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 9
    • 0036466678 scopus 로고    scopus 로고
    • Adding timestamps to the secure electronic auction protocol
    • Hwang, M.S., Eric J.L. Lu, and I.C. Lin, Adding timestamps to the secure electronic auction protocol, Data & Knowledge Engineering, 40(2), (2002), 155-162.
    • (2002) Data & Knowledge Engineering , vol.40 , Issue.2 , pp. 155-162
    • Hwang, M.S.1    Lu, E.J.L.2    Lin, I.C.3
  • 10
    • 78649433409 scopus 로고    scopus 로고
    • Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy
    • Lee, C.C., Chang, R.X., and Ko, H.J., Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy, International Journal of Foundations of Computer Science, 21(6), (2010), 979-991.
    • (2010) International Journal of Foundations of Computer Science , vol.21 , Issue.6 , pp. 979-991
    • Lee, C.C.1    Chang, R.X.2    Ko, H.J.3
  • 11
    • 84855269122 scopus 로고    scopus 로고
    • On security of a practical threeparty key exchange protocol with round efficiency
    • Lee, C.C., and Y.F. Chang, On security of a practical threeparty key exchange protocol with round efficiency, Information Technology and Control, 37(4), (2008), 333-335.
    • (2008) Information Technology and Control , vol.37 , Issue.4 , pp. 333-335
    • Lee, C.C.1    Chang, Y.F.2
  • 12
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • Lee, T.F., T. Hwang and C.L. Lin, Enhanced three-party encrypted key exchange without server public keys, Computers & Security, 23(7), 2004, 571-577.
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 13
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: attacks and a solution
    • Lin, C.L., H.M. Sun and T. Hwang, Three-party encrypted key exchange: attacks and a solution, ACM Operating Systems Review, 34(4), (2000), 12-20.
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 14
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • Lin, C.L., H.M. Sun, M. Steiner and T. Hwang, Three-party encrypted key exchange without server public-keys, IEEE Communications Letters, 5(12), (2001), 497-499.
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 15
    • 34548135536 scopus 로고    scopus 로고
    • Off-line password guessing attack on an efficient key agreement protocol for secure authentication
    • Lu, R. and Z. Cao, Off-line password guessing attack on an efficient key agreement protocol for secure authentication, International Journal of Network Security, 3(1), (2006), 35-38.
    • (2006) International Journal of Network Security , vol.3 , Issue.1 , pp. 35-38
    • Lu, R.1    Cao, Z.2
  • 16
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu, R. and Z. Cao, Simple three-party key exchange protocol, Computers & Security, 26(1), (2007), 94-97.
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 18
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • Nam J., Y. Lee, S. Kim, and D. Won, Security weakness in a three-party pairing-based protocol for password authenticated key exchange, Information Sciences, 177(6), (2007), 1364-1375.
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 19
    • 84870020541 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Specification for the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication (FIPS) 197, Available at
    • National Institute of Standards and Technology, Specification for the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication (FIPS) 197, Available at: http://csrc.nist. gov/publications/fips/fips197/fips-197.pdf.
  • 20
    • 0242552286 scopus 로고    scopus 로고
    • Security enhancement for the timestamp-based password authentication scheme using smart cards
    • Shen, J.J., C.W. Lin, and M.S. Hwang, Security enhancement for the timestamp-based password authentication scheme using smart cards, Computers & Security, 22(7), (2003), 591-595.
    • (2003) Computers & Security , vol.22 , Issue.7 , pp. 591-595
    • Shen, J.J.1    Lin, C.W.2    Hwang, M.S.3
  • 21
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • Steiner, M., G. Tsudik and M. Waidner, Refinement and extension of encrypted key exchange, ACM Operating Systems Review, 29(3), (1995), 22-30.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 22
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • Sun, H.M., B.C. Chen, and T. Hwang, Secure key agreement protocols for three-party against guessing attacks, The Journal of Systems and Software, 75, (2005), 63-68.
    • (2005) The Journal of Systems and Software , vol.75 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 23
  • 24
    • 21644467750 scopus 로고    scopus 로고
    • Provably secure threeparty password-based authenticated key exchange protocol using Weil pairing
    • Wen, H.A., T.F. Lee, and T. Hwang, Provably secure threeparty password-based authenticated key exchange protocol using Weil pairing, IEE Proceedings-Communications, 152(2), (2005), 138-143.
    • (2005) IEE Proceedings-Communications , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.A.1    Lee, T.F.2    Hwang, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.