메뉴 건너뛰기




Volumn 6, Issue 6, 2013, Pages 711-722

A simple and robust anonymous two-factor authenticated key exchange protocol

Author keywords

Authenticated key exchange protocol; Cryptography; KCI attack; Password; Two factor authentication

Indexed keywords

CHROMIUM COMPOUNDS; CRYPTOGRAPHY; NETWORK PROTOCOLS; NETWORK SECURITY; SMART CARDS;

EID: 84876784827     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.605     Document Type: Article
Times cited : (11)

References (26)
  • 1
    • 84876788695 scopus 로고    scopus 로고
    • The Internet Key-Exchange (IKE), RFC 2409
    • Harkins D, Carreal D. The Internet Key-Exchange (IKE), RFC 2409, 1998.
    • (1998)
    • Harkins, D.1    Carreal, D.2
  • 3
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password authenticated key exchange using human-memorable passwords
    • Katz J, Ostrovsky R, Yung M. Efficient password authenticated key exchange using human-memorable passwords. In Proceedings of the Eurocrypt 2001, 2001; 475-494.
    • (2001) Proceedings of the Eurocrypt 2001 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 4
    • 84876787327 scopus 로고    scopus 로고
    • The AuthA protocol for password-based authenticated key exchange. IEEE P1363
    • Bellare M, Rogaway P. The AuthA protocol for password-based authenticated key exchange. IEEE P1363, 2000.
    • (2000)
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 0028288854 scopus 로고
    • An attack on the Interlock Protocol when used for authentication
    • Bellovin S, Merritt M. An attack on the Interlock Protocol when used for authentication. IEEE Transactions on Information Theory 1994; 40(1):273-275.
    • (1994) IEEE Transactions on Information Theory , vol.40 , Issue.1 , pp. 273-275
    • Bellovin, S.1    Merritt, M.2
  • 7
    • 4043167845 scopus 로고    scopus 로고
    • Security improvement on a timestamp-based password authentication scheme
    • Wang Y, Li J. Security improvement on a timestamp-based password authentication scheme. IEEE Transactions on Consumer Electronics 2004; 50(2):580-582.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 580-582
    • Wang, Y.1    Li, J.2
  • 8
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang MS, Li LH. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; 46(1):28-30.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 10
    • 77956377490 scopus 로고    scopus 로고
    • A bilateral remote user authentication scheme that preserves user anonymity
    • Tseng HR, Jan RH, Yang W. A bilateral remote user authentication scheme that preserves user anonymity. Security and Communication Networks 2008; 1:301-308.
    • (2008) Security and Communication Networks , vol.1 , pp. 301-308
    • Tseng, H.R.1    Jan, R.H.2    Yang, W.3
  • 11
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L. Password authentication with insecure communication. Communications of the ACM 1981; 24(11):770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 12
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: smart card
    • Chien HY, Jan JK, Tseng YM. An efficient and practical solution to remote authentication: smart card. Computers & Security 2002; 21(4):372-375.
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 13
    • 0742268499 scopus 로고    scopus 로고
    • Security of Chien 's remote user authentication scheme using smart cards
    • Hsu CL. Security of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces 2004; 26(3):167-169.
    • (2004) Computer Standards & Interfaces , vol.26 , Issue.3 , pp. 167-169
    • Hsu, C.L.1
  • 14
    • 4043152192 scopus 로고    scopus 로고
    • Further improvement of an efficient password based remote user authentication scheme using smart cards
    • Yoon EJ, Ryu KY. Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2004; 50(2):612-614.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 612-614
    • Yoon, E.J.1    Ryu, K.Y.2
  • 15
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    • Wang X, Zhang W, Zhang J, Khan M. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards & Interfaces 2007; 29(5):507-512.
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.5 , pp. 507-512
    • Wang, X.1    Zhang, W.2    Zhang, J.3    Khan, M.4
  • 16
    • 62549133356 scopus 로고    scopus 로고
    • Robust and efficient password authenticated key agreement using smart cards
    • Juang WS, Chen ST, Liaw HT. Robust and efficient password authenticated key agreement using smart cards. IEEE Transaction on Industrial Electronics 2008; 55(6):2551-2556.
    • (2008) IEEE Transaction on Industrial Electronics , vol.55 , Issue.6 , pp. 2551-2556
    • Juang, W.S.1    Chen, S.T.2    Liaw, H.T.3
  • 18
    • 75449106985 scopus 로고    scopus 로고
    • Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
    • Li XX, Qiu WD, Zheng D, Chen KF, Li JH. Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transaction on Industrial Electronics 2010; 57(2):793-800.
    • (2010) IEEE Transaction on Industrial Electronics , vol.57 , Issue.2 , pp. 793-800
    • Li, X.X.1    Qiu, W.D.2    Zheng, D.3    Chen, K.F.4    Li, J.H.5
  • 19
    • 33746215179 scopus 로고    scopus 로고
    • On the resilience of key agreement protocols to key compromise impersonation
    • Strangio MA. On the resilience of key agreement protocols to key compromise impersonation. In Proceedings of EuroPKI 2006, 2006; 233-247.
    • (2006) Proceedings of EuroPKI 2006 , pp. 233-247
    • Strangio, M.A.1
  • 20
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: a high-performance secure Diffie-Hellman protocol
    • Krawczyk H. HMQV: a high-performance secure Diffie-Hellman protocol. In Proceedings of Crypto 2005, 2005; 546-566.
    • (2005) Proceedings of Crypto 2005 , pp. 546-566
    • Krawczyk, H.1
  • 24
    • 84876783591 scopus 로고    scopus 로고
    • Cryptology and the birthday paradox
    • Meijer AR. Cryptology and the birthday paradox. The UMAP Journal 1996; 17(1):71-84.
    • (1996) The UMAP Journal , vol.17 , Issue.1 , pp. 71-84
    • Meijer, A.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.