메뉴 건너뛰기




Volumn 6, Issue 11, 2013, Pages 1353-1358

Efficient three-party encrypted key exchange using trapdoor functions

Author keywords

Authentication; Network communications; Network protocols; Network security; Password

Indexed keywords

AUTHENTICATION; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY;

EID: 84886286402     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.717     Document Type: Article
Times cited : (4)

References (21)
  • 1
    • 0026850091 scopus 로고
    • Encrypted key exchange: password-based protocols secure against dictionary attacks. Proc. IEEE Symp. on Research in Security and Privacy
    • Bellovin SM, Merritt M. Encrypted key exchange: password-based protocols secure against dictionary attacks. Proc. IEEE Symp. on Research in Security and Privacy 1992; 72-84.
    • (1992) , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 2
    • 0029531472 scopus 로고
    • Optimal authentication protocols resistant to password guessing attacks. Proceedings of the 8th IEEE Computer Security Foundation Workshop : -.
    • Gong L. Optimal authentication protocols resistant to password guessing attacks. Proceedings of the 8th IEEE Computer Security Foundation Workshop 1995: 24-29.
    • (1995) , pp. 24-29
    • Gong, L.1
  • 5
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: attacks and a solution
    • Lin CL, Sun HM, Hwang T. Three-party encrypted key exchange: attacks and a solution. ACM Operating Systems Review 2000; 34(4):12-20.
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 6
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • Sun HM, Chen BC, Hwang T. Secure key agreement protocols for three-party against guessing attacks. Journal of Systems and Software 2005; 75:63-68.
    • (2005) Journal of Systems and Software , vol.75 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 7
    • 76349117227 scopus 로고    scopus 로고
    • Simple password-based three-party authenticated key exchange without server public keys
    • Lee TF, Hwang T. Simple password-based three-party authenticated key exchange without server public keys. Information Sciences 2010; 180(9):1702-1714.
    • (2010) Information Sciences , vol.180 , Issue.9 , pp. 1702-1714
    • Lee, T.F.1    Hwang, T.2
  • 8
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding Y, Horster P. Undetectable on-line password guessing attacks. ACM Operating Systems Review 1995; 29(4):77-86.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 9
    • 32244432466 scopus 로고    scopus 로고
    • Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords
    • E89-A
    • Nam J, Kim S, Won D. Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords. IEICE Transactions on Fundamentals 2006; E89-A(1):209-212.
    • (2006) IEICE Transactions on Fundamentals , Issue.1 , pp. 209-212
    • Nam, J.1    Kim, S.2    Won, D.3
  • 10
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • Chang CC, Chang YF. A novel three-party encrypted key exchange protocol. Computer Standards & Interfaces 2004; 26(5):471-476.
    • (2004) Computer Standards & Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 11
    • 84957657742 scopus 로고    scopus 로고
    • Many-to-one trapdoor functions and their relations to public-key cryptosystems. Proceedings of the CRYPTO'98, of LNCS 1462
    • Bellare M, Halevi S, Sahai A, Vadhan S. Many-to-one trapdoor functions and their relations to public-key cryptosystems. Proceedings of the CRYPTO'98, of LNCS 1462, 1998; 283-298.
    • (1998) , pp. 283-298
    • Bellare, M.1    Halevi, S.2    Sahai, A.3    Vadhan, S.4
  • 12
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions. Proceedings of the 21st ACM Symposium on the Theory of Computing ; -.
    • Goldreich O, Levin L. A hard-core predicate for all one-way functions. Proceedings of the 21st ACM Symposium on the Theory of Computing 1989; 25-32.
    • (1989) , pp. 25-32
    • Goldreich, O.1    Levin, L.2
  • 13
    • 0024866742 scopus 로고
    • Limits on the provable consequences of one-way permutations. Proceedings of the 21st ACM Symposium on the Theory of Computing ; -.
    • Impagaliazzo R, Rudich S. Limits on the provable consequences of one-way permutations. Proceedings of the 21st ACM Symposium on the Theory of Computing 1989; 44-61.
    • (1989) , pp. 44-61
    • Impagaliazzo, R.1    Rudich, S.2
  • 14
    • 35448940560 scopus 로고    scopus 로고
    • Security enhancement for a three-party encrypted key exchange protocol against undetectable online password guessing attacks
    • Chen HB, Chen TH, Lee WB, Chang CC. Security enhancement for a three-party encrypted key exchange protocol against undetectable online password guessing attacks. Computer Standards & Interfaces 2008; 30:95-99.
    • (2008) Computer Standards & Interfaces , vol.30 , pp. 95-99
    • Chen, H.B.1    Chen, T.H.2    Lee, W.B.3    Chang, C.C.4
  • 15
    • 42949161502 scopus 로고    scopus 로고
    • Improving the novel three-party encrypted key exchange protocol
    • Yoon EJ, Yoo KY. Improving the novel three-party encrypted key exchange protocol. Computer Standards & Interfaces 2008; 30:309-314.
    • (2008) Computer Standards & Interfaces , vol.30 , pp. 309-314
    • Yoon, E.J.1    Yoo, K.Y.2
  • 16
    • 68849121226 scopus 로고    scopus 로고
    • Cryptanalysis of two three-party encrypted key exchange protocols
    • Lo NW, Yeh KH. Cryptanalysis of two three-party encrypted key exchange protocols. Computer Standards & Interfaces 2009; 31:1167-1174.
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 1167-1174
    • Lo, N.W.1    Yeh, K.H.2
  • 18
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu R, Cao Z. Simple three-party key exchange protocol. Computers & Security 2007; 26(1):94-97.
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 19
    • 47549109760 scopus 로고    scopus 로고
    • A round and computation-efficient three-party authenticated key exchange protocol
    • Chen TH, Lee WB, Chen HB. A round and computation-efficient three-party authenticated key exchange protocol. Journal of Systems and Software 2008; 81(9):1581-1590.
    • (2008) Journal of Systems and Software , vol.81 , Issue.9 , pp. 1581-1590
    • Chen, T.H.1    Lee, W.B.2    Chen, H.B.3
  • 20
    • 77958095782 scopus 로고    scopus 로고
    • A communication-efficient three-party password authenticated key exchange protocol
    • Chang TY, Hwang MS, Yang WP. A communication-efficient three-party password authenticated key exchange protocol. Information Sciences 2011; 181(1):217-226.
    • (2011) Information Sciences , vol.181 , Issue.1 , pp. 217-226
    • Chang, T.Y.1    Hwang, M.S.2    Yang, W.P.3
  • 21
    • 80055041764 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol
    • Zhao J, Gu D. Provably secure three-party password-based authenticated key exchange protocol. Information Sciences 2012; 184(1):310-323.
    • (2012) Information Sciences , vol.184 , Issue.1 , pp. 310-323
    • Zhao, J.1    Gu, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.