메뉴 건너뛰기




Volumn 57, Issue 5-6, 2013, Pages 1175-1183

Re-attack on a three-party password-based authenticated key exchange protocol

Author keywords

Authenticated key exchange; Dictionary attack; Password based; Three party

Indexed keywords

AUTHENTICATED KEY EXCHANGE; AUTHENTICATED KEY EXCHANGE PROTOCOLS; DICTIONARY ATTACK; OFF-LINE DICTIONARY ATTACKS; PASSWORD-BASED; PROVABLE SECURITY; SECURITY WEAKNESS; SENSOR MONITORING; STOLEN VERIFIER ATTACK; THREE-PARTY;

EID: 84873080000     PISSN: 08957177     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.mcm.2012.10.019     Document Type: Article
Times cited : (10)

References (31)
  • 1
    • 0026850091 scopus 로고
    • Encrypted key exchange: password-based protocols secure against dictionary attacks
    • S.M. Bellovin, M. Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, in: Proc. of IEEE Symposium on Security and Privacy, 1992, pp. 72-84.
    • (1992) Proc. of IEEE Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 2
    • 0036825859 scopus 로고    scopus 로고
    • Pretty-simple password-authenticated key-exchange under standard assumptions
    • E85-A
    • Kobara K., Imai H. Pretty-simple password-authenticated key-exchange under standard assumptions. IEICE Trans. Fundam. Electron. 2002, E85-A:2229-2237.
    • (2002) IEICE Trans. Fundam. Electron. , pp. 2229-2237
    • Kobara, K.1    Imai, H.2
  • 4
    • 33846461562 scopus 로고    scopus 로고
    • The PAK suite: protocols for password-authenticated key exchange
    • P1363.2
    • MacKenzie P.D. The PAK suite: protocols for password-authenticated key exchange. Contrib. IEEE 2002, P1363.2.
    • (2002) Contrib. IEEE
    • MacKenzie, P.D.1
  • 5
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols
    • Proc. of Topics in Cryptology-CT-RSA
    • Abdalla M., Pointcheval D. Simple password-based encrypted key exchange protocols. LNCS 2005, vol. 3376:191-208.
    • (2005) LNCS , vol.3376 , pp. 191-208
    • Abdalla, M.1    Pointcheval, D.2
  • 6
    • 24144444566 scopus 로고    scopus 로고
    • One-time verifier-based encrypted key exchange
    • Proc. of PKC
    • Abdalla M., Chevassut O., Pointcheval D. One-time verifier-based encrypted key exchange. LNCS 2005, vol. 3386:47-64.
    • (2005) LNCS , vol.3386 , pp. 47-64
    • Abdalla, M.1    Chevassut, O.2    Pointcheval, D.3
  • 7
    • 84958760024 scopus 로고    scopus 로고
    • Elliptic curve based password authenticated key exchange protocols
    • Proc of ACISP
    • Boyd C., Montague P., Nguyen K. Elliptic curve based password authenticated key exchange protocols. LNCS 2001, vol. 2119:487-501.
    • (2001) LNCS , vol.2119 , pp. 487-501
    • Boyd, C.1    Montague, P.2    Nguyen, K.3
  • 8
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server's public keys
    • Lin C.-L., Sun H.-M., Steiner M., Hwang T. Three-party encrypted key exchange without server's public keys. IEEE Commun. Lett. 2001, 5:497-499.
    • (2001) IEEE Commun. Lett. , vol.5 , pp. 497-499
    • Lin, C.-L.1    Sun, H.-M.2    Steiner, M.3    Hwang, T.4
  • 9
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement for three parties without server's public key
    • Lee S.W., Kim H.S., Yoo K.Y. Efficient verifier-based key agreement for three parties without server's public key. Appl. Math. Comput. 2005, 167:996-1003.
    • (2005) Appl. Math. Comput. , vol.167 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 10
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server's public keys
    • Lee T.F., Hwang T., Lin C.L. Enhanced three-party encrypted key exchange without server's public keys. Comput. Secur. 2004, 23:571-577.
    • (2004) Comput. Secur. , vol.23 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 11
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange attacks and a solution
    • Lin C.L., Sun H.M., Hwang T. Three-party encrypted key exchange attacks and a solution. AACM Oper. Syst. Rev. 2000, 34:12-20.
    • (2000) AACM Oper. Syst. Rev. , vol.34 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 12
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Proc. of PKC
    • Abdalla M., Fouque P.-A., Pointcheval D. Password-based authenticated key exchange in the three-party setting. LNCS 2005, vol. 3386:65-84.
    • (2005) LNCS , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 13
    • 26444476977 scopus 로고    scopus 로고
    • Interactive Diffie-Hellman assumptions with applications to password-based authentication
    • Proc. of FC
    • Abdalla M., Pointcheval D. Interactive Diffie-Hellman assumptions with applications to password-based authentication. LNCS 2005, vol. 3570:341-356.
    • (2005) LNCS , vol.3570 , pp. 341-356
    • Abdalla, M.1    Pointcheval, D.2
  • 14
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu R., Cao Z. Simple three-party key exchange protocol. Comput. Secur. 2007, 26:94-97.
    • (2007) Comput. Secur. , vol.26 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 15
    • 33646805409 scopus 로고    scopus 로고
    • Examining indistinguishability-based proof models for key establishment protocols
    • Proc. of ASIACRYPT
    • Choo K.-K.R., Boyd C., Hitchcock Y. Examining indistinguishability-based proof models for key establishment protocols. LNCS 2005, vol. 3788:585-604.
    • (2005) LNCS , vol.3788 , pp. 585-604
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 16
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • Guo H., Li Z., Mu Y., Zhang X. Cryptanalysis of simple three-party key exchange protocol. Comput. Secur. 2008, 27:16-21.
    • (2008) Comput. Secur. , vol.27 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 17
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • Chung H.-R., Ku W.-C. Three weaknesses in a simple three-party key exchange protocol. Inform. Sci. 2008, 178:220-229.
    • (2008) Inform. Sci. , vol.178 , pp. 220-229
    • Chung, H.-R.1    Ku, W.-C.2
  • 18
    • 68849121226 scopus 로고    scopus 로고
    • Cryptanalysis of two three-party encrypted key exchange protocols
    • Lo N.W., Yeh Kuo-Hui Cryptanalysis of two three-party encrypted key exchange protocols. Comput. Stand. Interfaces 2009, 31:1167-1174.
    • (2009) Comput. Stand. Interfaces , vol.31 , pp. 1167-1174
    • Lo, N.W.1    Yeh, K.-H.2
  • 19
    • 42649086478 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
    • Raphael C.-W.P., Yau W.-C., Bok-Min G. Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). Inform. Sci. 2008, 178:2849-2856.
    • (2008) Inform. Sci. , vol.178 , pp. 2849-2856
    • Raphael, C.-W.P.1    Yau, W.-C.2    Bok-Min, G.3
  • 20
    • 58049215501 scopus 로고    scopus 로고
    • Enhanced password-based simple three-party key exchange protocol
    • Kim H.-S., Choi J.-Y. Enhanced password-based simple three-party key exchange protocol. Comput. Electr. Eng. 2009, 35:107-114.
    • (2009) Comput. Electr. Eng. , vol.35 , pp. 107-114
    • Kim, H.-S.1    Choi, J.-Y.2
  • 21
    • 84873088253 scopus 로고    scopus 로고
    • Infringing and improving password security of a three-party key exchange protocol
    • Available at
    • J. Nam, Infringing and improving password security of a three-party key exchange protocol. Available at: http://eprint.iacr.org/2008/065/.
    • Nam, J.1
  • 22
    • 63649090970 scopus 로고    scopus 로고
    • An off-line dictionary attack on a simple three-party key exchange protocol
    • Nam J., Paik J., Kang H., Kim U., Won D. An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Commun. Lett. 2009, 13:205-207.
    • (2009) IEEE Commun. Lett. , vol.13 , pp. 205-207
    • Nam, J.1    Paik, J.2    Kang, H.3    Kim, U.4    Won, D.5
  • 23
    • 68049147074 scopus 로고    scopus 로고
    • A simple three-party password-based key exchange protocol
    • Huang H.-F. A simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 2009, 22:857-862.
    • (2009) Int. J. Commun. Syst. , vol.22 , pp. 857-862
    • Huang, H.-F.1
  • 24
    • 79953304485 scopus 로고    scopus 로고
    • Cryptanalysis of a simple three-party password-based key exchange protocol
    • Yoon E.J., Yoo K.Y. Cryptanalysis of a simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 2011, 24:532-542.
    • (2011) Int. J. Commun. Syst. , vol.24 , pp. 532-542
    • Yoon, E.J.1    Yoo, K.Y.2
  • 25
    • 84862680843 scopus 로고    scopus 로고
    • Enhancements of a threeparty password-based authenticated key exchange protocol
    • IAJIT First Online Publication
    • Wu S., Chen K., Zhu Y. Enhancements of a threeparty password-based authenticated key exchange protocol. Int. Arab J. Inf. Technol. 2013, 10. IAJIT First Online Publication http://www.ccis2k.org/iajit/PDF/vol.10,no.3/2-2982.pdf.
    • (2013) Int. Arab J. Inf. Technol. , vol.10
    • Wu, S.1    Chen, K.2    Zhu, Y.3
  • 26
    • 80051506042 scopus 로고    scopus 로고
    • Secure verifier-based three-party key exchange in the random oracle model
    • Chien H.-Y. Secure verifier-based three-party key exchange in the random oracle model. J. Inf. Sci. Eng. 2011, 27:1487-1501.
    • (2011) J. Inf. Sci. Eng. , vol.27 , pp. 1487-1501
    • Chien, H.-Y.1
  • 27
    • 84872314754 scopus 로고    scopus 로고
    • Secure verifier-based three-party password-authenticated key exchange
    • Pu Q., Wang J., Wu S. Secure verifier-based three-party password-authenticated key exchange. Peer Peer Netw. Appl. 2012, 10.1007/s12083-012-0125-y.
    • (2012) Peer Peer Netw. Appl.
    • Pu, Q.1    Wang, J.2    Wu, S.3
  • 28
    • 84971660027 scopus 로고    scopus 로고
    • Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
    • Proc. of INDOCRYPT
    • Wang W., Hu L. Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols. LNCS 2006, vol. 4329:118-132.
    • (2006) LNCS , vol.4329 , pp. 118-132
    • Wang, W.1    Hu, L.2
  • 29
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Proc. of EUROCRYPT
    • Bellare M., Pointcheval D., Rogaway P. Authenticated key exchange secure against dictionary attacks. LNCS 2000, vol. 1807:139-155.
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 30
    • 35048866891 scopus 로고    scopus 로고
    • New security results on encrypted key exchange
    • Proc. of PKC
    • Bresson E., Chevassut O., Pointcheval D. New security results on encrypted key exchange. LNCS 2004, vol. 2947:145-158.
    • (2004) LNCS , vol.2947 , pp. 145-158
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 31
    • 84937579774 scopus 로고    scopus 로고
    • The oracle Diffie-Hellman assumptions and an analysis of DHIES
    • Proc. of CT-RSA
    • Abdalla M., Bellare M., Rogaway P. The oracle Diffie-Hellman assumptions and an analysis of DHIES. LNCS 2001, vol. 2020:143-158.
    • (2001) LNCS , vol.2020 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.