메뉴 건너뛰기




Volumn 6, Issue 1, 2013, Pages 15-25

Secure verifier-based three-party password-authenticated key exchange

Author keywords

Authenticated key exchange; Dictionary attack; Password based; Three party; Verifier based

Indexed keywords

AUTHENTICATION; PEER TO PEER NETWORKS;

EID: 84872314754     PISSN: 19366442     EISSN: 19366450     Source Type: Journal    
DOI: 10.1007/s12083-012-0125-y     Document Type: Article
Times cited : (17)

References (22)
  • 1
    • 0026850091 scopus 로고
    • Encrypted key exchange: password-based protocols secure against dictionary attacks
    • IEEE Computer Society Press
    • Bellovin S, Merritt M (1992) Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proc of IEEE symposium on security and privacyz. IEEE Computer Society Press, pp 72-84.
    • (1992) Proc of IEEE symposium on security and privacyz , pp. 72-84
    • Bellovin, S.1    Merritt, M.2
  • 2
    • 0036825859 scopus 로고    scopus 로고
    • Pretty-simple password-authenticated key-exchange under standard assumptions
    • Kobara K, Imai H (2002) Pretty-simple password-authenticated key-exchange under standard assumptions. Trans IEICE E85-A(10): 2229-2237.
    • (2002) Trans IEICE , vol.E85-A , Issue.10 , pp. 2229-2237
    • Kobara, K.1    Imai, H.2
  • 7
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement for three parties without server's public key
    • Lee S, Kim H, Yoo K (2005) Efficient verifier-based key agreement for three parties without server's public key. Appl Math Comput 167(2): 96-1003.
    • (2005) Appl Math Comput , vol.167 , Issue.2 , pp. 96-1003
    • Lee, S.1    Kim, H.2    Yoo, K.3
  • 8
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server's public keys
    • Lin C, Sun H, Steiner M, Hwang T (2001) Three-party encrypted key exchange without server's public keys. IEEE Commun Lett 5(12): 497-499.
    • (2001) IEEE Commun Lett , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.1    Sun, H.2    Steiner, M.3    Hwang, T.4
  • 9
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server's public keys
    • Lee T, Hwang T, Lin C (2004) Enhanced three-party encrypted key exchange without server's public keys. Comput Secur 23(7): 571-577.
    • (2004) Comput Secur , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.1    Hwang, T.2    Lin, C.3
  • 10
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu R, Cao Z (2007) Simple three-party key exchange protocol. Comput Secur 26: 94-97.
    • (2007) Comput Secur , vol.26 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 11
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • (Full version appeared in IEE Information Security 153(1): 27-39)
    • Abdalla M, Fouque P, Pointcheval D (2006) Password-based authenticated key exchange in the three-party setting. In: Proc of PKC'2005, LNCS 3386, pp 65-84 (Full version appeared in IEE Information Security 153(1): 27-39).
    • (2006) Proc of PKC'2005, LNCS 3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.2    Pointcheval, D.3
  • 12
    • 26444476977 scopus 로고    scopus 로고
    • Interactive Diffie-Hellman assumptions with applications to password-based authentication
    • Abdalla M, Pointcheval D (2005) Interactive Diffie-Hellman assumptions with applications to password-based authentication. In: Proc of FC'2005, LNCS 3570, pp 341-356.
    • (2005) Proc of FC'2005, LNCS 3570 , pp. 341-356
    • Abdalla, M.1    Pointcheval, D.2
  • 13
    • 34248672528 scopus 로고    scopus 로고
    • Efficient verifierbased password-authenticated key exchange in the three-party setting
    • Kwon J, Jeong I, Sakurai K, Lee D (2007) Efficient verifierbased password-authenticated key exchange in the three-party setting. Comp Stand Inter 29: 513-520.
    • (2007) Comp Stand Inter , vol.29 , pp. 513-520
    • Kwon, J.1    Jeong, I.2    Sakurai, K.3    Lee, D.4
  • 14
    • 68049147074 scopus 로고    scopus 로고
    • A simple three-party password-based key exchange protocol
    • Huang H (2009) A simple three-party password-based key exchange protocol. Int J Commun Syst 22(7): 857-862.
    • (2009) Int J Commun Syst , vol.22 , Issue.7 , pp. 857-862
    • Huang, H.1
  • 15
    • 84862680843 scopus 로고    scopus 로고
    • Enhancements of a three-party password-based authenticated key exchange protocol
    • IAJIT First Online Publication
    • Wu S, Chen K, Zhu Y (2013) Enhancements of a three-party password-based authenticated key exchange protocol. International Arab Journal of Information Technology, 10(3). IAJIT First Online Publication http://www. ccis2k. org/iajit/PDF/vol. 10, no. 3/2-2982. pdf.
    • (2013) International Arab Journal of Information Technology , vol.10 , Issue.3
    • Wu, S.1    Chen, K.2    Zhu, Y.3
  • 16
    • 69649092978 scopus 로고    scopus 로고
    • Provably secure password-based three-party key exchange with optimal message steps
    • Chien H, Wu T (2009) Provably secure password-based three-party key exchange with optimal message steps. Comput J 52(6): 646-655.
    • (2009) Comput J , vol.52 , Issue.6 , pp. 646-655
    • Chien, H.1    Wu, T.2
  • 17
    • 76349117227 scopus 로고    scopus 로고
    • Simple password-based three-party authenticated key exchange without server public keys
    • Lee T, Hwang T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inform Sci 180(9): 1702-1714.
    • (2010) Inform Sci , vol.180 , Issue.9 , pp. 1702-1714
    • Lee, T.1    Hwang, T.2
  • 18
    • 80051506042 scopus 로고    scopus 로고
    • Secure verifier-based three-party key exchange in the random oracle model
    • Chien H (2011) Secure verifier-based three-party key exchange in the random oracle model. J Inf Sci Eng 27(4): 1487-1501.
    • (2011) J Inf Sci Eng , vol.27 , Issue.4 , pp. 1487-1501
    • Chien, H.1
  • 19
    • 79953304485 scopus 로고    scopus 로고
    • Cryptanalysis of a simple three-party password-based key exchange protocol
    • Yoon E, Yoo K (2011) Cryptanalysis of a simple three-party password-based key exchange protocol. Int J Commun Syst 24(4): 532-542.
    • (2011) Int J Commun Syst , vol.24 , Issue.4 , pp. 532-542
    • Yoon, E.1    Yoo, K.2
  • 20
    • 33646805409 scopus 로고    scopus 로고
    • Examining indistinguishability-based proof models for key establishment protocols
    • Choo K, Boyd C, Hitchcock Y (2005) Examining indistinguishability-based proof models for key establishment protocols. In: Proc of ASIACRYPT'2005, LNCS 3788, pp 585-604.
    • (2005) Proc of ASIACRYPT'2005, LNCS 3788 , pp. 585-604
    • Choo, K.1    Boyd, C.2    Hitchcock, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.