메뉴 건너뛰기




Volumn 38, Issue 8, 2013, Pages 2055-2061

An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments

Author keywords

Elliptic curve cryptosystem; ID based; Three party key exchange

Indexed keywords


EID: 84880720107     PISSN: 2193567X     EISSN: 21914281     Source Type: Journal    
DOI: 10.1007/s13369-013-0575-4     Document Type: Article
Times cited : (27)

References (23)
  • 4
    • 74149086367 scopus 로고    scopus 로고
    • Two proposed identity-based three-party authenticated key agreement protocols from pairings
    • Hölbl M., Welzer T., Brumen B: Two proposed identity-based three-party authenticated key agreement protocols from pairings. Comput. Secur. 29, 244-252 (2010).
    • (2010) Comput. Secur. , vol.29 , pp. 244-252
    • Hölbl, M.1    Welzer, T.2    Brumen, B.3
  • 5
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • Lee T. F., Hwang T., Lin C. L: Enhanced three-party encrypted key exchange without server public keys. Comput. Secur. 23(6), 571-577 (2004).
    • (2004) Comput. Secur. , vol.23 , Issue.6 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 6
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without server's public key
    • Lee S. W., Kim H. S., Yoo K. Y: Efficient verifier-based key agreement protocol for three parties without server's public key. Appl. Math. Comput. 167(2), 996-1003 (2005).
    • (2005) Appl. Math. Comput. , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 7
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: attacks and a solution
    • Lin C. L., Sun H. M., Hwang T: Three-party encrypted key exchange: attacks and a solution. ACM Oper. Syst. Rev. 34, 12-20 (2000).
    • (2000) ACM Oper. Syst. Rev. , vol.34 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 8
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • Sun H. M., Chen B. C., Hwang T: Secure key agreement protocols for three-party against guessing attacks. J. Syst. Softw. 75, 63-68 (2005).
    • (2005) J. Syst. Softw. , vol.75 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 9
    • 47549109760 scopus 로고    scopus 로고
    • A round-and computation-efficient three-party authenticated key exchange protocol
    • Chen T. H., Lee W. B., Chen H. B: A round-and computation-efficient three-party authenticated key exchange protocol. J. Syst. Softw. 81, 1581-1590 (2008).
    • (2008) J. Syst. Softw. , vol.81 , pp. 1581-1590
    • Chen, T.H.1    Lee, W.B.2    Chen, H.B.3
  • 10
    • 0000537828 scopus 로고
    • Efficient identification and signature for smart cards
    • Schnorr, C. P.: Efficient identification and signature for smart cards. In: Proceedings of CRYPTO'89, 239-252 (1989).
    • (1989) Proceedings of CRYPTO'89 , pp. 239-252
    • Schnorr, C.P.1
  • 11
    • 68949161753 scopus 로고    scopus 로고
    • An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    • Yang J.-H., Chin-Chen C: An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J. Syst. Softw. 82, 1497-1520 (2009).
    • (2009) J. Syst. Softw. , vol.82 , pp. 1497-1520
    • Yang, J.-H.1    Chin-Chen, C.2
  • 12
    • 85015402934 scopus 로고
    • In: Advances in cryptology. Proceedings of CRYPTO'85
    • Miller, V. S.: Use of elliptic curves in cryptography. In: Advances in cryptology. Proceedings of CRYPTO'85, 417-26 (1986).
    • (1986) Use of elliptic curves in cryptography , pp. 417-426
    • Miller, V.S.1
  • 13
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • Koblitz N: Elliptic curve cryptosystem. Math. Comput. 48, 203-209 (1987).
    • (1987) Math. Comput. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 15
    • 78651538975 scopus 로고    scopus 로고
    • An enhanced three-party authentication key exchange protocol for mobile commerce environments
    • Tan Z: An enhanced three-party authentication key exchange protocol for mobile commerce environments. J. Commun. 5(4), 436-443 (2010).
    • (2010) J. Commun. , vol.5 , Issue.4 , pp. 436-443
    • Tan, Z.1
  • 16
    • 79955722723 scopus 로고    scopus 로고
    • Security weaknesses of authenticated key agreement protocols
    • doi: 10. 1016/j. ipl. 2011. 04. 007
    • Nose, P.: Security weaknesses of authenticated key agreement protocols. Inf. Process. Lett. doi: 10. 1016/j. ipl. 2011. 04. 007 (2011).
    • (2011) Inf. Process. Lett
    • Nose, P.1
  • 17
    • 78650405278 scopus 로고    scopus 로고
    • Smart card-based secure web services in the three-party setting
    • Wang R., Juang W., Lei C: Smart card-based secure web services in the three-party setting. Int. J. Innov. Comput. Inf. Control. 6(11), 5259-5274 (2010).
    • (2010) Int. J. Innov. Comput. Inf. Control. , vol.6 , Issue.11 , pp. 5259-5274
    • Wang, R.1    Juang, W.2    Lei, C.3
  • 18
    • 77953893048 scopus 로고    scopus 로고
    • An efficient three-party authenticated key exchange protocol with one-time key
    • Lv, C.; Ma, M.; Li, H.; Ma, J.: An efficient three-party authenticated key exchange protocol with one-time key. Proceedings of IEEE INFOCOM 2010, 1-5 (2010).
    • (2010) Proceedings of IEEE INFOCOM 2010 , pp. 1-5
    • Lv, C.1    Ma, M.2    Li, H.3    Ma, J.4
  • 19
    • 79952645251 scopus 로고    scopus 로고
    • Robust biometric-based three-party authenticated key establishment protocols
    • Yoon E., Yoo K: Robust biometric-based three-party authenticated key establishment protocols. Int. J. Comput. Math. 88(5), 1144-1157 (2011).
    • (2011) Int. J. Comput. Math. , vol.88 , Issue.5 , pp. 1144-1157
    • Yoon, E.1    Yoo, K.2
  • 20
    • 79953330802 scopus 로고    scopus 로고
    • Efficient three-party password-based key exchange scheme
    • Lou D., Huang H: Efficient three-party password-based key exchange scheme. Int. J. Commun. Syst. 24, 504-512 (2011).
    • (2011) Int. J. Commun. Syst. , vol.24 , pp. 504-512
    • Lou, D.1    Huang, H.2
  • 21
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature protocols
    • Shamir, A.: Identity based cryptosystems and signature protocols. In: Proceedings of CRYPTO' 84, 47-53 (1984).
    • (1984) Proceedings of CRYPTO' 84 , pp. 47-53
    • Shamir, A.1
  • 23
    • 77955431593 scopus 로고    scopus 로고
    • A secure and efficient SIP authentication scheme for converged VoIP networks
    • Yoon, E. J.; Yoo, K. Y.; Kim, W. H.: A secure and efficient SIP authentication scheme for converged VoIP networks. Comput. Commun. 33, 1674-1681 (2010).
    • (2010) Comput. Commun , vol.33 , pp. 1674-1681
    • Yoon, E.J.1    Yoo, K.Y.2    Kim, W.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.