메뉴 건너뛰기




Volumn 58, Issue 1, 2014, Pages 29-38

Provably secure three-party authenticated key agreement protocol using smart cards

Author keywords

Provable security; Random oracle model; Smart card; Three party authenticated key agreement

Indexed keywords

AUTHENTICATED KEY AGREEMENT; AUTHENTICATED KEY AGREEMENT PROTOCOLS; CLOCK SYNCHRONIZATION; COMMUNICATION LATENCY; CRYPTOGRAPHIC PRIMITIVES; DIFFIE-HELLMAN ASSUMPTION; PROVABLE SECURITY; RANDOM ORACLE MODEL;

EID: 84893715932     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2013.08.020     Document Type: Article
Times cited : (68)

References (27)
  • 3
    • 84945132563 scopus 로고    scopus 로고
    • Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • J. Katz, R. Ostrovsky, M. Yung, Efficient password-authenticated key exchange using human-memorable passwords, in: Proc. Eurocrypt 2001, LNCS 2045, Springer-Verlag, 2001, pp. 475-494. (Pubitemid 33275849)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 4
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
    • M. Abdalla, P.A. Fouque, D. Pointcheval, Password based authenticated key exchange in the three-party setting, in: Proc. PKC'05, 2005, pp. 65-84. (Pubitemid 41231326)
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 8
    • 75449106985 scopus 로고    scopus 로고
    • Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
    • X. Li, W. Qiu, D. Zheng, K. Chen, and J. Li Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards IEEE Transactions on Industrial Electronics 57 2010 793 800
    • (2010) IEEE Transactions on Industrial Electronics , vol.57 , pp. 793-800
    • Li, X.1    Qiu, W.2    Zheng, D.3    Chen, K.4    Li, J.5
  • 12
    • 0025771853 scopus 로고
    • Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol
    • K. Gaarder, and E. Snekkenes Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol Journal of Cryptology 3 1991 81 98 (Pubitemid 21700571)
    • (1991) Journal of Cryptology , vol.3 , Issue.2 , pp. 81-98
    • Gaarder Klaus1    Snekkenes Einar2
  • 16
    • 4043095653 scopus 로고    scopus 로고
    • Efficient three-party key exchange using smart cards
    • W.S. Juang Efficient three-party key exchange using smart cards IEEE Transactions on Consumer Electronics 50 2004 619 624
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , pp. 619-624
    • Juang, W.S.1
  • 27
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • R. Canetti R,H. Krawczyk, Analysis of key-exchange protocols and their use for building secure channels, in: Proc. 20th International Conference on the Theory and Application of Cryptographic, Techniques (EUROCRYPT'01), 2001, pp. 453-474. (Pubitemid 33275848)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.