메뉴 건너뛰기




Volumn 26, Issue 5, 2013, Pages 674-686

Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme

Author keywords

authenticated key exchange; dictionary attack; password based; three party

Indexed keywords

AUTHENTICATED KEY EXCHANGE; DICTIONARY ATTACK; OFF-LINE DICTIONARY ATTACKS; PASSWORD-BASED; PASSWORD-BASED KEY EXCHANGE; THREE-PARTY;

EID: 84876132598     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.1362     Document Type: Article
Times cited : (21)

References (47)
  • 10
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement for three parties without server's public key
    • Lee SW, Kim HS, Yoo KY,. Efficient verifier-based key agreement for three parties without server's public key. Applied Mathematics and Computation 2005; 167 (2): 996-1003.
    • (2005) Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 11
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server's public keys
    • Lin CL, Sun HM, Steiner M, Hwang MT,. Three-party encrypted key exchange without server's public keys. IEEE Communication Letters 2001; 5 (12): 497-499.
    • (2001) IEEE Communication Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, M.T.4
  • 12
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • Sun H, Chen MB, Hwang T,. Secure key agreement protocols for three-party against guessing attacks. The Journal of Systems and Software 2005; 75: 63-1003.
    • (2005) The Journal of Systems and Software , vol.75 , pp. 63-1003
    • Sun, H.1    Chen, M.B.2    Hwang, T.3
  • 13
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding Y, Horster P,. Undetectable on-line password guessing attacks. ACM Operating Systems Review 1995; 29 (24): 77-86.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.24 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 15
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without servers public keys
    • Lee TF, Hwang T, Lin CL,. Enhanced three-party encrypted key exchange without servers public keys. Computers and Security 2004; 23 (7): 571-577.
    • (2004) Computers and Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 16
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange attacks and a solution
    • Lin C, Sun HM, Hwang T,. Three-party encrypted key exchange attacks and a solution. ACM Operating Systems Review 2000; 34 (4): 12-20.
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.1    Sun, H.M.2    Hwang, T.3
  • 18
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Lecture Notes in Computer Science. Springer: Berlin, Full version appeared in IEE Information Security 2006, 153(1): 27-39
    • Abdalla M, Fouque PA, Pointcheval D,. Password-based authenticated key exchange in the three-party setting. In Proceedings of PKC'2005, Vol. 3386, Lecture Notes in Computer Science. Springer: Berlin, 2005; 65-84. Full version appeared in IEE Information Security 2006, 153(1): 27-39.
    • (2005) Proceedings of PKC'2005 , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.A.2    Pointcheval, D.3
  • 19
    • 26444476977 scopus 로고    scopus 로고
    • Interactive Diffie-Hellman assumptions with applications to password-based authentication
    • Lecture Notes in Computer Science. Springer: Berlin
    • Abdalla M, Pointcheval D,. Interactive Diffie-Hellman assumptions with applications to password-based authentication. In Proceedings of Financial Cryptography'2005, Vol. 3570, Lecture Notes in Computer Science. Springer: Berlin, 2005; 341-356.
    • (2005) Proceedings of Financial Cryptography'2005 , vol.3570 , pp. 341-356
    • Abdalla, M.1    Pointcheval, D.2
  • 20
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu RX, Cao ZF,. Simple three-party key exchange protocol. Computers and Security 2007; 26: 94-97.
    • (2007) Computers and Security , vol.26 , pp. 94-97
    • Lu, R.X.1    Cao, Z.F.2
  • 21
    • 68049147074 scopus 로고    scopus 로고
    • A simple three-party password-based key exchange protocol
    • John Wiley & Sons, DOI: 10.1002/dac.1002
    • Huang HF,. A simple three-party password-based key exchange protocol. International Journal of Communication Systems 2009 John Wiley & Sons, DOI: 10.1002/dac.1002.
    • (2009) International Journal of Communication Systems
    • Huang, H.F.1
  • 22
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding Y, Horster P,. Undetectable on-line password guessing attacks. ACM Operating Systems Review 1995; 29: 77-86.
    • (1995) ACM Operating Systems Review , vol.29 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 23
    • 79953308424 scopus 로고    scopus 로고
    • Enhanced password-based simple three-party key exchange protocol
    • Kim HS, Choi JY,. Enhanced password-based simple three-party key exchange protocol. Computers and Electrical Engineering 2009; 22: 857-862.
    • (2009) Computers and Electrical Engineering , vol.22 , pp. 857-862
    • Kim, H.S.1    Choi, J.Y.2
  • 24
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • Guo H, Li Z, Mu Y, Zhang X,. Cryptanalysis of simple three-party key exchange protocol. Computers and Security 2008; 27: 16-21.
    • (2008) Computers and Security , vol.27 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 25
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • Chung HR, Ku WC,. Three weaknesses in a simple three-party key exchange protocol. Information Science 2008; 178: 220-229.
    • (2008) Information Science , vol.178 , pp. 220-229
    • Chung, H.R.1    Ku, W.C.2
  • 26
    • 68849121226 scopus 로고    scopus 로고
    • Cryptanalysis of two three party encrypted key exchange protocols
    • DOI: 10.1016/j.csi.2009.03.002
    • Lo NW, Yeh KH,. Cryptanalysis of two three party encrypted key exchange protocols. Computer Standards & Interfaces 2009, DOI: 10.1016/j.csi.2009.03. 002.
    • (2009) Computer Standards & Interfaces
    • Lo, N.W.1    Yeh, K.H.2
  • 27
    • 42649086478 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
    • Phan Raphael CW, Yau WC, Bok-Min G,. Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). Information Science 2008; 178: 2849-2856.
    • (2008) Information Science , vol.178 , pp. 2849-2856
    • Phan Raphael, C.W.1    Yau, W.C.2    Bok-Min, G.3
  • 29
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • Nam J, Lee Y, Kim S, Won D,. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences 2007; 177 (6): 1364-1375.
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 30
    • 84971660027 scopus 로고    scopus 로고
    • Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
    • Lecture Notes in Computer Science. Springer: Berlin
    • Wang W, Hu L,. Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols. In Proceedings of INDOCRYPT 2006, Vol. 4329, Lecture Notes in Computer Science. Springer: Berlin, 2006; 118-132.
    • (2006) Proceedings of INDOCRYPT 2006 , vol.4329 , pp. 118-132
    • Wang, W.1    Hu, L.2
  • 31
    • 33646805409 scopus 로고    scopus 로고
    • Examining indistinguishability-based proof models for key establishment protocols
    • Lecture Notes in Computer Science, Springer: Berlin
    • Choo KKR, Boyd C, Hitchcock Y,. Examining indistinguishability-based proof models for key establishment protocols. In Proceedings of Advances in Cryptology-Asiacrypt'05, Vol. 3788, Lecture Notes in Computer Science, Springer: Berlin, 2005; 585-604.
    • (2005) Proceedings of Advances in Cryptology - Asiacrypt'05 , vol.3788 , pp. 585-604
    • Choo, K.K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 32
    • 79953330802 scopus 로고    scopus 로고
    • Efficient three-party password-based key exchange scheme
    • John Wiley & Sons, Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/dac.1172
    • Lou DC, Huang H F,. Efficient three-party password-based key exchange scheme. International Journal of Communication Systems 2010 John Wiley & Sons, Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/dac.1172.
    • (2010) International Journal of Communication Systems
    • Lou, D.C.1    Huang, H.F.2
  • 34
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • Koblitz N,. Elliptic curve cryptosystem. Mathematics of Computation 1987; 48: 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 37
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Lecture Notes in Computer Science. Springer: Berlin
    • Barreto PSLM, Kim HY, Lynn B,. 2002. Efficient algorithms for pairing-based cryptosystems. In Proceedings of CRYPTO'2002, Vol. 2442, Lecture Notes in Computer Science. Springer: Berlin; 354-368.
    • (2002) Proceedings of CRYPTO'2002 , vol.2442 , pp. 354-368
    • Barreto, P.1    Kim, H.Y.2    Lynn, B.3
  • 40
    • 77955659710 scopus 로고    scopus 로고
    • An efficient user authentication and key exchange protocol for mobile client-server environment
    • Wu TY, Tseng YM,. An efficient user authentication and key exchange protocol for mobile client-server environment. Computer Networks 2010; 54 (9): 1520-1530.
    • (2010) Computer Networks , vol.54 , Issue.9 , pp. 1520-1530
    • Wu, T.Y.1    Tseng, Y.M.2
  • 41
  • 42
    • 77955657180 scopus 로고    scopus 로고
    • Philips HiPerSmart, http://www.testech-elect.com/ashling/hps\-tools.htm.
    • Philips HiPerSmart
  • 43
    • 84937579774 scopus 로고    scopus 로고
    • The oracle Diffie-Hellman assumptions and an analysis of DHIES
    • Springer: Berlin
    • Abdalla M, Bellare M, Rogaway P,. The oracle Diffie-Hellman assumptions and an analysis of DHIES. In Proceedings of CT-RSA'2001. Springer: Berlin, 2001; 143-158.
    • (2001) Proceedings of CT-RSA'2001 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 45
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • Lecture Notes in Computer Science, Springer: Berlin
    • Bellare M, Desai A, Pointcheval D, Rogaway P,. Relations among notions of security for public-key encryption schemes. In Proceedings of Advances in Cryptology-CRYPTO 1998, Vol. 1462, Lecture Notes in Computer Science, Springer: Berlin, 1998; 26-45.
    • (1998) Proceedings of Advances in Cryptology - CRYPTO 1998 , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 46
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Lecture Notes in Computer Science. Springer: Berlin
    • Fiat A, Shamir A,. How to prove yourself: practical solutions to identification and signature problems. In Proceedings of Advances in Cryptology-CRYPTO 1986, Vol. 263, Lecture Notes in Computer Science. Springer: Berlin, 1986; 186-194.
    • (1986) Proceedings of Advances in Cryptology - CRYPTO 1986 , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.