메뉴 건너뛰기




Volumn 66, Issue 2, 2013, Pages 973-988

Two ID-based authenticated schemes with key agreement for mobile environments

Author keywords

Authentication; Elliptic curve cryptosystem; Key agreement; Mobile environment

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; GEOMETRY; NETWORK SECURITY;

EID: 84887909067     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-013-0962-3     Document Type: Article
Times cited : (38)

References (24)
  • 3
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Innsbruck, Austria 10.1007/3-540-44987-6-28 10.1007/3-540-44987-6-28
    • Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: Proc of advances in cryptology - EUROCRYPT 2001, Innsbruck, Austria, pp 453-474. doi: 10.1007/3-540-44987-6-28
    • (2001) Proc of Advances in Cryptology - EUROCRYPT 2001 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 4
    • 47549109760 scopus 로고    scopus 로고
    • A round-and computation-efficient three-party authenticated key exchange protocol
    • 10.1016/j.jss.2007.11.720 10.1016/j.jss.2007.11.720
    • Chen TH, Lee WB, Chen HB (2008) A round-and computation-efficient three-party authenticated key exchange protocol. J Syst Softw 81:1581-1590. doi: 10.1016/j.jss.2007.11.720
    • (2008) J Syst Softw , vol.81 , pp. 1581-1590
    • Chen, T.H.1    Lee, W.B.2    Chen, H.B.3
  • 5
    • 0017018484 scopus 로고
    • New directions in cryptography
    • 10.1109/TIT.1976.1055638 437208 10.1109/TIT.1976.1055638
    • Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory IT-22(6):644-654. doi: 10.1109/TIT.1976.1055638
    • (1976) IEEE Trans Inf Theory , vol.226 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 6
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three party key exchange protocol
    • 10.1016/j.cose.2008.03.001 10.1016/j.cose.2008.03.001
    • Guo H, Li Z, Mu Y, Zhang X (2008) Cryptanalysis of simple three party key exchange protocol. Comput Secur 27(1):16-21. doi: 10.1016/j.cose.2008.03.001
    • (2008) Comput Secur , vol.27 , Issue.1 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 7
    • 84887950204 scopus 로고    scopus 로고
    • An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    • http://eprint.iacr.org/2011/195.pdf
    • He D, Chen Y (2011) An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. In: IACR cryptology eprint archive. http://eprint.iacr.org/2011/195.pdf
    • (2011) IACR Cryptology Eprint Archive
    • He, D.1    Chen, Y.2
  • 8
    • 80051571433 scopus 로고    scopus 로고
    • An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
    • 10.1016/j.inffus.2011.01.001 10.1016/j.inffus.2010.02.001
    • He D, Chen J, Hu J (2011) An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf Fusion 13:223-230. doi: 10.1016/j.inffus.2011.01.001
    • (2011) Inf Fusion , vol.13 , pp. 223-230
    • He, D.1    Chen, J.2    Hu, J.3
  • 9
    • 74149086367 scopus 로고    scopus 로고
    • Two proposed identity-based three-party authenticated key agreement protocols from pairings
    • 10.1016/j.cose.2009.08.006 10.1016/j.cose.2009.08.006
    • Hölbl M, Welzer T, Brumen B (2010) Two proposed identity-based three-party authenticated key agreement protocols from pairings. Comput Secur 29(2):244-252. doi: 10.1016/j.cose.2009.08.006
    • (2010) Comput Secur , vol.29 , Issue.2 , pp. 244-252
    • Hölbl, M.1    Welzer, T.2    Brumen, B.3
  • 10
    • 80052774690 scopus 로고    scopus 로고
    • A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    • 10.1016/j.jss.2011.06.061 10.1016/j.jss.2011.06.061
    • Islam SH, Biswas GP (2011) A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J Syst Softw 84(11):1892-1898. doi: 10.1016/j.jss.2011.06. 061
    • (2011) J Syst Softw , vol.84 , Issue.11 , pp. 1892-1898
    • Islam, S.H.1    Biswas, G.P.2
  • 11
    • 67649746889 scopus 로고    scopus 로고
    • An unknown key-share attack on the MQV key agreement protocol
    • 10.1145/501978.501981 10.1145/501978.501981
    • Kaliski B Jr (2001) An unknown key-share attack on the MQV key agreement protocol. ACM Trans Inf Syst Secur 4:275-288. doi: 10.1145/501978.501981
    • (2001) ACM Trans Inf Syst Secur , vol.4 , pp. 275-288
    • Kaliski, Jr.B.1
  • 12
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystem
    • 866109 10.1090/S0025-5718-1987-0866109-5
    • Koblitz N (1987) Elliptic curve cryptosystem. Math Comput 48:203-209
    • (1987) Math Comput , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 13
    • 84855269122 scopus 로고    scopus 로고
    • On security of a practical three-party key exchange protocol with round efficiency
    • 2369557
    • Lee CC, Chang YF (2008) On security of a practical three-party key exchange protocol with round efficiency. Inf Technol Control 37(4):333-335
    • (2008) Inf Technol Control , vol.37 , Issue.4 , pp. 333-335
    • Lee, C.C.1    Chang, Y.F.2
  • 14
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without server's public key
    • 10.1016/j.amc.2004.06.129 2169747 10.1016/j.amc.2004.06.129
    • Lee SW, Kim HS, Yoo KY (2005) Efficient verifier-based key agreement protocol for three parties without server's public key. Appl Math Comput 167(2):996-1003. doi: 10.1016/j.amc.2004.06.129
    • (2005) Appl Math Comput , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 15
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • 10.1016/j.cose.2006.08.005 10.1016/j.cose.2006.08.005
    • Lu R, Cao Z (2007) Simple three-party key exchange protocol. Comput Secur 26(1):94-97. doi: 10.1016/j.cose.2006.08.005
    • (2007) Comput Secur , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 16
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • 85 10.1007/3-540-39799-X-31
    • Miller VS (1986) Use of elliptic curves in cryptography. In: Proc of advances in cryptology - CRYPTO, vol 85, pp 417-426
    • (1986) Proc of Advances in Cryptology - CRYPTO , pp. 417-426
    • Miller, V.S.1
  • 17
    • 77957204726 scopus 로고    scopus 로고
    • Improved three party EKE protocol
    • Padmavathy R (2010) Improved three party EKE protocol. Inf Technol Control 39(3):220-226
    • (2010) Inf Technol Control , vol.39 , Issue.3 , pp. 220-226
    • Padmavathy, R.1
  • 18
    • 78651538975 scopus 로고    scopus 로고
    • An enhanced three-party authentication key exchange protocol for mobile commerce environments
    • 10.4304/jcm.5.5.436-443
    • Tan Z (2010) An enhanced three-party authentication key exchange protocol for mobile commerce environments. J Commun 5:436-443. doi: 10.4304/jcm.5.5.436- 443
    • (2010) J Commun , vol.5 , pp. 436-443
    • Tan, Z.1
  • 19
    • 33947405259 scopus 로고    scopus 로고
    • An efficient two-party identity-based key exchange protocol
    • Tseng YM (2007) An efficient two-party identity-based key exchange protocol. Informatica 18:125-136
    • (2007) Informatica , vol.18 , pp. 125-136
    • Tseng, Y.M.1
  • 20
    • 63049116480 scopus 로고    scopus 로고
    • An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    • 10.1016/j.cose.2008.11.008 10.1016/j.cose.2008.11.008
    • Yang JH, Chang CC (2009) An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput Secur 28:138-143. doi: 10.1016/j.cose.2008.11.008
    • (2009) Comput Secur , vol.28 , pp. 138-143
    • Yang, J.H.1    Chang, C.C.2
  • 21
    • 68949161753 scopus 로고    scopus 로고
    • An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    • 10.1016/j.jss.2009.03.075 10.1016/j.jss.2009.03.075
    • Yang JH, Chang CC (2009) An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J Syst Softw 82:1497-1502. doi: 10.1016/j.jss.2009.03.075
    • (2009) J Syst Softw , vol.82 , pp. 1497-1502
    • Yang, J.H.1    Chang, C.C.2
  • 22
    • 84859178298 scopus 로고    scopus 로고
    • A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices
    • Yoon E, Choi S, Yoo K (2012) A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices. Int J Innov Comput Inf Control 8(4):2637-2653
    • (2012) Int J Innov Comput Inf Control , vol.8 , Issue.4 , pp. 2637-2653
    • Yoon, E.1    Choi, S.2    Yoo, K.3
  • 23
    • 42949161502 scopus 로고    scopus 로고
    • Improving the novel three-party encrypted key exchange protocol
    • 10.1016/j.csi.2007.08.018 10.1016/j.csi.2007.08.018
    • Yoon EJ, Yoo KY (2008) Improving the novel three-party encrypted key exchange protocol. Comput Stand Interfaces 30(5):309-314. doi: 10.1016/j.csi.2007.08.018
    • (2008) Comput Stand Interfaces , vol.30 , Issue.5 , pp. 309-314
    • Yoon, E.J.1    Yoo, K.Y.2
  • 24
    • 70749138135 scopus 로고    scopus 로고
    • Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC
    • 10.1109/CSE.2009.363 10.1109/CSE.2009.363
    • Yoon E, Yoo K (2009) Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: Proc of 2009 international conference on computational science and engineering, pp 633-640. doi: 10.1109/CSE.2009.363
    • (2009) Proc of 2009 International Conference on Computational Science and Engineering , pp. 633-640
    • Yoon, E.1    Yoo, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.