메뉴 건너뛰기




Volumn 66, Issue 2, 2013, Pages 863-874

Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol

Author keywords

Dictionary attack; Key exchange; Password based authentication; Security analysis

Indexed keywords

AUTHENTICATION; SECURITY SYSTEMS;

EID: 84888013229     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-013-0917-8     Document Type: Article
Times cited : (20)

References (21)
  • 3
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • 10.1016/j.csi.2003.12.001
    • Chang CC, Chang YF (2004) A novel three-party encrypted key exchange protocol. Comput Stand Interfaces 26(5):471-476
    • (2004) Comput Stand Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 4
    • 77958095782 scopus 로고    scopus 로고
    • A communication-efficient three-party password authenticated key exchange protocol
    • 2737470 10.1016/j.ins.2010.08.032
    • Chang TY, Hwang MS, Yang WP (2011) A communication-efficient three-party password authenticated key exchange protocol. Inf Sci 181:217-226
    • (2011) Inf Sci , vol.181 , pp. 217-226
    • Chang, T.Y.1    Hwang, M.S.2    Yang, W.P.3
  • 5
    • 69649092978 scopus 로고    scopus 로고
    • Provably secure password-based three-party key exchange with optimal message steps
    • 10.1093/comjnl/bxn070
    • Chien HY, Wu TC (2009) Provably secure password-based three-party key exchange with optimal message steps. Comput J 52(6):646-655
    • (2009) Comput J , vol.52 , Issue.6 , pp. 646-655
    • Chien, H.Y.1    Wu, T.C.2
  • 6
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • 2375875 10.1016/j.ins.2007.08.004
    • Chung HR, Ku WC (2008) Three weaknesses in a simple three-party key exchange protocol. Inf Sci 178(1):220-229
    • (2008) Inf Sci , vol.178 , Issue.1 , pp. 220-229
    • Chung, H.R.1    Ku, W.C.2
  • 7
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • 10.1145/206826.206834
    • Ding Y, Horster P (1995) Undetectable on-line password guessing attacks. Oper Syst Rev 29(3):22-30
    • (1995) Oper Syst Rev , vol.29 , Issue.3 , pp. 22-30
    • Ding, Y.1    Horster, P.2
  • 9
    • 0027615231 scopus 로고
    • Protecting poorly chosen secrets from guessing attacks
    • 10.1109/49.223865
    • Gong L, Lomas M, Needham R, Saltzer J (1993) Protecting poorly chosen secrets from guessing attacks. IEEE J Sel Areas Commun 11(5):648-656
    • (1993) IEEE J Sel Areas Commun , vol.11 , Issue.5 , pp. 648-656
    • Gong, L.1    Lomas, M.2    Needham, R.3    Saltzer, J.4
  • 11
    • 58049215501 scopus 로고    scopus 로고
    • Enhanced password-based simple three-party key exchange protocol
    • 10.1016/j.compeleceng.2008.05.007
    • Kim HS, Choi JY (2009) Enhanced password-based simple three-party key exchange protocol. Comput Electr Eng 35(1):107-114
    • (2009) Comput Electr Eng , vol.35 , Issue.1 , pp. 107-114
    • Kim, H.S.1    Choi, J.Y.2
  • 12
    • 0033157651 scopus 로고    scopus 로고
    • An improvement of the password-based authentication protocol K1P on security against replay attacks
    • Kwon T, Kang M, Jung S, Song J (1999) An improvement of the password-based authentication protocol K1P on security against replay attacks. IEICE Trans Commun E82-B(7):991-997
    • (1999) IEICE Trans Commun , vol.82 , Issue.7 , pp. 991-997
    • Kwon, T.1    Kang, M.2    Jung, S.3    Song, J.4
  • 13
    • 67649791953 scopus 로고    scopus 로고
    • Communication-efficient three-party protocols for authentication and key agreement
    • 2554008 10.1016/j.camwa.2009.02.039
    • Lee TF, Liu JL, Sung MJ, Yang SB, Chen CM (2009) Communication-efficient three-party protocols for authentication and key agreement. Comput Math Appl 58:641-648
    • (2009) Comput Math Appl , vol.58 , pp. 641-648
    • Lee, T.F.1    Liu, J.L.2    Sung, M.J.3    Yang, S.B.4    Chen, C.M.5
  • 14
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution
    • 10.1145/506106.506108
    • Lin CL, Sun HM, Hwang T (2000) Three-party encrypted key exchange: attacks and a solution. Oper Syst Rev 34(4):12-20
    • (2000) Oper Syst Rev , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 15
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • 10.1109/4234.974498
    • Lin CL, Sun HM, Steiner M, Hwang T (2001) Three-party encrypted key exchange without server public-keys. IEEE Commun Lett 5(12):497-499
    • (2001) IEEE Commun Lett , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 16
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • 2307164 10.1016/j.ins.2006.09.001
    • Nam J, Lee Y, Kim S, Won D (2007) Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Inf Sci 177(6):1364-1375
    • (2007) Inf Sci , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 17
    • 63649090970 scopus 로고    scopus 로고
    • An off-line dictionary attack on a simple three-party key exchange protocol
    • 10.1109/LCOMM.2009.081609
    • Nam J, Paik J, Kang HK, Kim UM, Won D (2009) An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Commun Lett 13(3):205-207
    • (2009) IEEE Commun Lett , vol.13 , Issue.3 , pp. 205-207
    • Nam, J.1    Paik, J.2    Kang, H.K.3    Kim, U.M.4    Won, D.5
  • 18
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • 10.1145/206826.206834
    • Steiner M, Tsudik G, Waidner M (1995) Refinement and extension of encrypted key exchange. Oper Syst Rev 29(3):22-30
    • (1995) Oper Syst Rev , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 19
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • 10.1016/j.jss.2003.11.017
    • Sun HM, Chen BC, Hwang T (2005) Secure key agreement protocols for three-party against guessing attacks. J Syst Softw 75(1-2):63-68
    • (2005) J Syst Softw , vol.75 , Issue.1-2 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 20
    • 21644467750 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
    • 10.1049/ip-com:20045087
    • Wen HA, Lee TF, Hwang T (2005) Provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEE Proc, Commun 152(2):138-143
    • (2005) IEE Proc, Commun , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.A.1    Lee, T.F.2    Hwang, T.3
  • 21
    • 1842478681 scopus 로고    scopus 로고
    • Password-based user authentication and key distribution protocols for client-server applications
    • 10.1016/S0164-1212(03)00093-1
    • Yeh HT, Sun HM (2004) Password-based user authentication and key distribution protocols for client-server applications. J Syst Softw 72(1):97-103
    • (2004) J Syst Softw , vol.72 , Issue.1 , pp. 97-103
    • Yeh, H.T.1    Sun, H.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.