메뉴 건너뛰기




Volumn 38, Issue 8, 2013, Pages 2069-2077

ECC-Based Password-Authenticated Key Exchange in the Three-Party Setting

Author keywords

Authenticated key exchange; Dictionary attack; Elliptic curve; Password based; Three party

Indexed keywords


EID: 84880711245     PISSN: 2193567X     EISSN: 21914281     Source Type: Journal    
DOI: 10.1007/s13369-013-0543-z     Document Type: Article
Times cited : (11)

References (31)
  • 2
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-Hellman
    • LNCS,Springer
    • Boyko, V.; MacKenzie, P. D.; Patel, S.: Provably secure password-authenticated key exchange using Diffie-Hellman. In: Proceedings of Advances in Cryptology: EUROCRYPT 2000. LNCS, vol. 1807, pp. 156-171. Springer (2000).
    • (2000) Proceedings of Advances in Cryptology: EUROCRYPT 2000 , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.D.2    Patel, S.3
  • 4
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • LNCS,Springer
    • Gennaro, R.; Lindell, Y.: A framework for password-based authenticated key exchange. In: Proceedings of Advances in Cryptology: EUROCRYPT 2003. LNCS, vol. 2656, pp. 524-543. Springer (2003).
    • (2003) Proceedings of Advances in Cryptology: EUROCRYPT 2003 , vol.2656 , pp. 524-543
    • Gennaro, R.1    Lindell, Y.2
  • 9
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols
    • LNCS,Springer
    • Abdalla, M.; Pointcheval, D.: Simple password-based encrypted key exchange protocols. In: Proceedings of Topics in Cryptology: CT-RSA 2005. LNCS, vol. 3376, pp. 191-208, Springer (2005).
    • (2005) Proceedings of Topics in Cryptology: CT-RSA 2005 , vol.3376 , pp. 191-208
    • Abdalla, M.1    Pointcheval, D.2
  • 10
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • LNCS,Springer,[Full version appeared in IEE Information Security 153(1), 27-39 (2006)]
    • Abdalla, M.; Fouque, P.-A.; Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Proceedings of PKC'2005. LNCS, vol. 3386, pp. 65-84, Springer (2005) [Full version appeared in IEE Information Security 153(1), 27-39 (2006)].
    • (2005) Proceedings of PKC'2005 , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 11
    • 26444476977 scopus 로고    scopus 로고
    • Interactive Diffie-Hellman assumptions with applications to password-based authentication
    • LNCS,Springer
    • Abdalla, M.; Pointcheval, D.: Interactive Diffie-Hellman assumptions with applications to password-based authentication. In: Proceedings of FC'2005. LNCS, vol. 3570, pp. 341-356. Springer (2005).
    • (2005) Proceedings of FC'2005 , vol.3570 , pp. 341-356
    • Abdalla, M.1    Pointcheval, D.2
  • 12
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu R. X., Cao Z. F (2007) Simple three-party key exchange protocol. Comput. Secur. 26: 94-97.
    • (2007) Comput. Secur. , vol.26 , pp. 94-97
    • Lu, R.X.1    Cao, Z.F.2
  • 13
    • 69649092978 scopus 로고    scopus 로고
    • Provably secure password-based three-party key exchange with optimal message steps
    • Chien H. Y., Wu T. C (2009) Provably secure password-based three-party key exchange with optimal message steps. Comput. J. 52(6): 646-655.
    • (2009) Comput. J. , vol.52 , Issue.6 , pp. 646-655
    • Chien, H.Y.1    Wu, T.C.2
  • 14
    • 68049147074 scopus 로고    scopus 로고
    • A simple three-party password-based key exchange protocol
    • Huang H.-F (2009) A simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 22(7): 857-862.
    • (2009) Int. J. Commun. Syst. , vol.22 , Issue.7 , pp. 857-862
    • Huang, H.-F.1
  • 15
    • 84875321481 scopus 로고    scopus 로고
    • An improvement on a three-party password-based key exchange protocol using weil pairing
    • Zeng Y., Ma J., Moon S (2010) An improvement on a three-party password-based key exchange protocol using weil pairing. Int. J. Netw. Secur. 11(1): 17-22.
    • (2010) Int. J. Netw. Secur. , vol.11 , Issue.1 , pp. 17-22
    • Zeng, Y.1    Ma, J.2    Moon, S.3
  • 16
    • 80052492581 scopus 로고    scopus 로고
    • An advanced password authenticated key exchange protocol for imbalanced wireless networks
    • Lo J.-W., Lee J.-Z., Hwang M.-S., Chu Y.-P (2010) An advanced password authenticated key exchange protocol for imbalanced wireless networks. J. Internet Technol. 11(7): 997-1004.
    • (2010) J. Internet Technol. , vol.11 , Issue.7 , pp. 997-1004
    • Lo, J.-W.1    Lee, J.-Z.2    Hwang, M.-S.3    Chu, Y.-P.4
  • 17
    • 76349117227 scopus 로고    scopus 로고
    • Simple password-based three-party authenticated key exchange without server public keys
    • Lee T-F., Hwang T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inf. Sci. 180(9): 1702-1714.
    • (2010) Inf. Sci. , vol.180 , Issue.9 , pp. 1702-1714
    • Lee, T.-F.1    Hwang, T.2
  • 18
    • 77958095782 scopus 로고    scopus 로고
    • A communication- efficient three-party password authenticated key exchange protocol
    • Chang T.-Y., Hwang M.-S., Yang W.-P (2011) A communication- efficient three-party password authenticated key exchange protocol. Inf. Sci. 181: 217-226.
    • (2011) Inf. Sci. , vol.181 , pp. 217-226
    • Chang, T.-Y.1    Hwang, M.-S.2    Yang, W.-P.3
  • 19
    • 80051506042 scopus 로고    scopus 로고
    • Secure verifier-based three-party key exchange in the random oracle model
    • H.-Y. Chien (2011) Secure verifier-based three-party key exchange in the random oracle model. J. Inf. Sci. Eng. 27(4): 1487-1501.
    • (2011) J. Inf. Sci. Eng. , vol.27 , Issue.4 , pp. 1487-1501
    • Chien, H.-Y.1
  • 20
    • 79953330802 scopus 로고    scopus 로고
    • Efficient three-party password-based key exchange scheme
    • Lou D.-C., Huang H.-F (2011) Efficient three-party password-based key exchange scheme. Int. J. Commun. Syst. 24(4): 504-512.
    • (2011) Int. J. Commun. Syst. , vol.24 , Issue.4 , pp. 504-512
    • Lou, D.-C.1    Huang, H.-F.2
  • 21
    • 84971660027 scopus 로고    scopus 로고
    • Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
    • LNCS,Springer
    • Wang, W.; Hu, L.: Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols. In: Proceedings of INDOCRYPT 2006. LNCS, vol. 4329, pp. 118-132. Springer (2006).
    • (2006) Proceedings of INDOCRYPT 2006 , vol.4329 , pp. 118-132
    • Wang, W.1    Hu, L.2
  • 22
    • 33646805409 scopus 로고    scopus 로고
    • Examining indistinguishability-based proof models for key establishment protocols
    • LNCS,Springer
    • Choo, K.-K. R.; Boyd, C.; Hitchcock, Y.: Examining indistinguishability-based proof models for key establishment protocols. In: Proceedings of ASIACRYPT'2005. LNCS, vol. 3788, pp. 585-604. Springer (2005).
    • (2005) Proceedings of ASIACRYPT'2005 , vol.3788 , pp. 585-604
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 23
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • Chung H.-R., Ku W.-C (2008) Three weaknesses in a simple three-party key exchange protocol. Inf. Sci. 178: 220-229.
    • (2008) Inf. Sci. , vol.178 , pp. 220-229
    • Chung, H.-R.1    Ku, W.-C.2
  • 24
    • 79953304485 scopus 로고    scopus 로고
    • Cryptanalysis of a simple three-party password-based key exchange protocol
    • Yoon E. J., Yoo K. Y (2011) Cryptanalysis of a simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 24(4): 532-542.
    • (2011) Int. J. Commun. Syst. , vol.24 , Issue.4 , pp. 532-542
    • Yoon, E.J.1    Yoo, K.Y.2
  • 26
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • Koblitz N (1987) Elliptic curve cryptosystem. Math. Comput. 48: 203-209.
    • (1987) Math. Comput. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 29
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding Y., Horster P (1995) Undetectable on-line password guessing attacks. ACM Oper. Syst. Rev. 29: 77-86.
    • (1995) ACM Oper. Syst. Rev. , vol.29 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 30
    • 84873080000 scopus 로고    scopus 로고
    • Re-attack on a three-party password-based authenticated key exchange protocol
    • doi: 10. 1016/j. mcm. 2012. 10. 019
    • Liang, H.; Hu, J.; Wu, S.: Re-attack on a three-party password-based authenticated key exchange protocol. Math. Comput. Model. (2012). doi: 10. 1016/j. mcm. 2012. 10. 019.
    • (2012) Math. Comput. Model
    • Liang, H.1    Hu, J.2    Wu, S.3
  • 31
    • 79958169657 scopus 로고    scopus 로고
    • Security analysis and enhancements of verifier-based password-authenticated key exchange protocols in the three-party setting
    • Wu S (2011) Security analysis and enhancements of verifier-based password-authenticated key exchange protocols in the three-party setting. J. Inf. Sci. Eng. 27: 1059-1072.
    • (2011) J. Inf. Sci. Eng. , vol.27 , pp. 1059-1072
    • Wu, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.