메뉴 건너뛰기




Volumn 235, Issue , 2013, Pages 329-340

Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys

Author keywords

Authentication; Key Compromise Impersonation (KCI) attack; Password based; Three party key exchange

Indexed keywords

AUTHENTICATED KEY EXCHANGE; FUTURE DESIGNS; KEY EXCHANGE; KEY-COMPROMISE IMPERSONATION; PASSWORD AUTHENTICATED KEY EXCHANGE PROTOCOLS; PASSWORD-BASED; SESSION KEY; THREE-PARTY;

EID: 84875929826     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2013.02.004     Document Type: Article
Times cited : (23)

References (27)
  • 1
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols
    • LNCS Springer
    • M. Abdalla, and D. Pointcheval Simple password-based encrypted key exchange protocols Topics in cryptology-CT-RSA 2005 LNCS vol. 3376 2005 Springer 191 208
    • (2005) Topics in Cryptology-CT-RSA 2005 , vol.3376 , pp. 191-208
    • Abdalla, M.1    Pointcheval, D.2
  • 2
    • 24144444566 scopus 로고    scopus 로고
    • One-Time verifier-based encrypted key exchange
    • S. Vaudenay, LNCS Springer
    • M. Abdalla, O. Chevassut, and D. Pointcheval One-Time verifier-based encrypted key exchange S. Vaudenay, Public Key Cryptography-PKC 2005 LNCS vol. 3386 2005 Springer 47 64
    • (2005) Public Key Cryptography-PKC 2005 , vol.3386 , pp. 47-64
    • Abdalla, M.1    Chevassut, O.2    Pointcheval, D.3
  • 4
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • M. Darnell, 6th IMA International Conference, LNCS Springer
    • S. Blake-Wilson, D. Johnson, and A. Menezes Key agreement protocols and their security analysis M. Darnell, Proceedings of Cryptography and Coding 6th IMA International Conference, LNCS vol. 1355 1997 Springer 30 45
    • (1997) Proceedings of Cryptography and Coding , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 5
    • 18444399366 scopus 로고    scopus 로고
    • Simple authenticated key agreement and protected password change protocol
    • T.Y. Chang, W.P. Yang, and M.S. Hwang Simple authenticated key agreement and protected password change protocol Computers & Mathematics with Applications 49 5-6 2005 703 714
    • (2005) Computers & Mathematics with Applications , vol.49 , Issue.56 , pp. 703-714
    • Chang, T.Y.1    Yang, W.P.2    Hwang, M.S.3
  • 7
    • 77958095782 scopus 로고    scopus 로고
    • A communication-efficient three-party password authenticated key exchange protocol
    • T.Y. Chang, M.S. Hwang, and W.P. Yang A communication-efficient three-party password authenticated key exchange protocol Information Sciences 181 1 2011 217 226
    • (2011) Information Sciences , vol.181 , Issue.1 , pp. 217-226
    • Chang, T.Y.1    Hwang, M.S.2    Yang, W.P.3
  • 8
    • 47549109760 scopus 로고    scopus 로고
    • A round-and computation-efficient three party authenticated key exchange protocol
    • T.H. Chen, W.B. Lee, and H.B. Chen A round-and computation-efficient three party authenticated key exchange protocol Journal of Systems and Software 81 9 2008 1581 1590
    • (2008) Journal of Systems and Software , vol.81 , Issue.9 , pp. 1581-1590
    • Chen, T.H.1    Lee, W.B.2    Chen, H.B.3
  • 10
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • H. Guo, Z. Li, Y. Mu, and Y. Zhang Cryptanalysis of simple three-party key exchange protocol Computers & Security 27 1-2 2008 16 21
    • (2008) Computers & Security , vol.27 , Issue.12 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, Y.4
  • 11
    • 68049147074 scopus 로고    scopus 로고
    • A simple three-party password-based key exchange protocol
    • H.F. Huang A simple three-party password-based key exchange protocol International Journal of Communication Systems 22 7 2009 857 862
    • (2009) International Journal of Communication Systems , vol.22 , Issue.7 , pp. 857-862
    • Huang, H.F.1
  • 12
    • 77958081838 scopus 로고    scopus 로고
    • A new secure remote user authentication scheme with smart cards
    • M. Kumar A new secure remote user authentication scheme with smart cards International Journal of Network Security 11 3 2010 128 133
    • (2010) International Journal of Network Security , vol.11 , Issue.3 , pp. 128-133
    • Kumar, M.1
  • 14
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • T.F. Lee, T. Hwang, and C.L. Lin Enhanced three-party encrypted key exchange without server public keys Computers & Security 23 7 2004 571 577
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 15
    • 76349117227 scopus 로고    scopus 로고
    • Simple password-based three-party authenticated key exchange without server public keys
    • T.F. Lee, and T. Hwang Simple password-based three-party authenticated key exchange without server public keys Information Sciences 180 9 2010 1702 1714
    • (2010) Information Sciences , vol.180 , Issue.9 , pp. 1702-1714
    • Lee, T.F.1    Hwang, T.2
  • 16
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • C.L. Lin, H.M. Sun, M. Steiner, and T. Hwang Three-party encrypted key exchange without server public-keys IEEE Communications Letters 5 12 2001 497 499
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 18
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • R. Lu, and Z. Cao Simple three-party key exchange protocol Computers & Security 26 1 2007 94 97
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 21
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • J. Nam, Y. Lee, S. Kim, and D. Won Security weakness in a three-party pairing-based protocol for password authenticated key exchange Information Sciences 177 6 2007 1364 1375
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 22
    • 42649086478 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
    • R.C.-W. Phana, W.C. Yaub, and B.M. Goi Cryptanalysis of simple three-party key exchange protocol (S-3PAKE) Information Sciences 178 13 2008 2849 2856
    • (2008) Information Sciences , vol.178 , Issue.13 , pp. 2849-2856
    • Phana, R.C.-W.1    Yaub, W.C.2    Goi, B.M.3
  • 23
    • 78651538975 scopus 로고    scopus 로고
    • An enhanced three-party authentication key exchange protocol for mobile commerce environments
    • Z.W. Tan An enhanced three-party authentication key exchange protocol for mobile commerce environments Journal of Communications 5 5 2010 436 443
    • (2010) Journal of Communications , vol.5 , Issue.5 , pp. 436-443
    • Tan, Z.W.1
  • 24
    • 79956034033 scopus 로고    scopus 로고
    • Extended KCI attack against two-party key establishment protocols
    • Q. Tang, and L. Chen Extended KCI attack against two-party key establishment protocols Information Processing Letters 111 15 2011 744 747
    • (2011) Information Processing Letters , vol.111 , Issue.15 , pp. 744-747
    • Tang, Q.1    Chen, L.2
  • 25
    • 84864760957 scopus 로고    scopus 로고
    • Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
    • S. Wu, Q. Pu, S. Wang, and D. He Cryptanalysis of a communication- efficient three-party password authenticated key exchange protocol Information Sciences 215 1 2012 83 96
    • (2012) Information Sciences , vol.215 , Issue.1 , pp. 83-96
    • Wu, S.1    Pu, Q.2    Wang, S.3    He, D.4
  • 26
    • 68949161753 scopus 로고    scopus 로고
    • An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    • J.H. Yang, and C.C. Chang An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments Journal of Systems and Software 82 9 2009 1497 1502
    • (2009) Journal of Systems and Software , vol.82 , Issue.9 , pp. 1497-1502
    • Yang, J.H.1    Chang, C.C.2
  • 27
    • 80055041764 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol
    • J. Zhao, and D. Gu Provably secure three-party password-based authenticated key exchange protocol Information Sciences 184 1 2012 310 323
    • (2012) Information Sciences , vol.184 , Issue.1 , pp. 310-323
    • Zhao, J.1    Gu, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.