메뉴 건너뛰기




Volumn 70, Issue 2, 2014, Pages 1002-1022

An efficient client–client password-based authentication scheme with provable security

Author keywords

Impersonation attack; Key exchange protocol; Off line password guessing attack; Password based authentication; Random oracle model

Indexed keywords

COMPUTER PROGRAMMING; SOFTWARE ENGINEERING;

EID: 84919877261     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-014-1273-z     Document Type: Article
Times cited : (35)

References (43)
  • 1
    • 79955735535 scopus 로고    scopus 로고
    • Vulnerability of two multiple-key agreement protocols
    • Farash MS, Bayat M, Attari MA (2011) Vulnerability of two multiple-key agreement protocols. Comput Electr Eng 37(2):199–204
    • (2011) Comput Electr Eng , vol.37 , Issue.2 , pp. 199-204
    • Farash, M.S.1    Bayat, M.2    Attari, M.A.3
  • 2
    • 84899624931 scopus 로고    scopus 로고
    • A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings
    • Farash MS, Attari MA, Bayat M (2012) A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings. IACSIT Int J Eng Technol 4(3):321–325
    • (2012) IACSIT Int J Eng Technol , vol.4 , Issue.3 , pp. 321-325
    • Farash, M.S.1    Attari, M.A.2    Bayat, M.3
  • 3
    • 84876280558 scopus 로고    scopus 로고
    • A new efficient authenticated multiple-key exchange protocol from bilinear pairings
    • Farash MS, Attari MA, Atani RE, Jami M (2013) A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Comput Electr Eng 39(2):530–541
    • (2013) Comput Electr Eng , vol.39 , Issue.2 , pp. 530-541
    • Farash, M.S.1    Attari, M.A.2    Atani, R.E.3    Jami, M.4
  • 4
    • 84902245219 scopus 로고    scopus 로고
    • Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
    • Farash MS, Attari MA (2013) Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. ISC Int J Inf Secur 5(1):1–15
    • (2013) ISC Int J Inf Secur , vol.5 , Issue.1 , pp. 1-15
    • Farash, M.S.1    Attari, M.A.2
  • 5
    • 84893678218 scopus 로고    scopus 로고
    • A pairing-free ID-based key agreement protocol with different PKGs
    • Farash MS, Attari MA (2014) A pairing-free ID-based key agreement protocol with different PKGs. Int J Netw Secur 16(2):143–148
    • (2014) Int J Netw Secur , vol.16 , Issue.2 , pp. 143-148
    • Farash, M.S.1    Attari, M.A.2
  • 6
    • 77952761859 scopus 로고    scopus 로고
    • Key agreement protocol over the ring of multivariate polynomials
    • Sakalauskas E, Katvickis A, Dosinas G (2010) Key agreement protocol over the ring of multivariate polynomials. Inf Technol Control 39(1):51–54
    • (2010) Inf Technol Control , vol.39 , Issue.1 , pp. 51-54
    • Sakalauskas, E.1    Katvickis, A.2    Dosinas, G.3
  • 7
    • 77952689504 scopus 로고    scopus 로고
    • A key agreement scheme for satellite communications
    • Lee CC, Lin TC, Hwang MS (2010) A key agreement scheme for satellite communications. Inf Technol Control 39(1):43–47
    • (2010) Inf Technol Control , vol.39 , Issue.1 , pp. 43-47
    • Lee, C.C.1    Lin, T.C.2    Hwang, M.S.3
  • 8
    • 80053369762 scopus 로고    scopus 로고
    • An new efficient key agreement scheme for VSAT satellite communications based on elliptic curve cryptosystem
    • Hong JW, Yoon SY, Park DI, Choi MJ, Yoon EJ, Yoo KY (2011) An new efficient key agreement scheme for VSAT satellite communications based on elliptic curve cryptosystem. Inf Technol Control 40(3):252–259
    • (2011) Inf Technol Control , vol.40 , Issue.3 , pp. 252-259
    • Hong, J.W.1    Yoon, S.Y.2    Park, D.I.3    Choi, M.J.4    Yoon, E.J.5    Yoo, K.Y.6
  • 9
    • 84902279247 scopus 로고    scopus 로고
    • A strongly secure pairing-free certificateless authenticated key agreement protocol for low-power devices
    • Haiyan S, Qiaoyan W, Hua Z, Zhengping J (2013) A strongly secure pairing-free certificateless authenticated key agreement protocol for low-power devices. Inf Technol Control 42(2):105–112
    • (2013) Inf Technol Control , vol.42 , Issue.2 , pp. 105-112
    • Haiyan, S.1    Qiaoyan, W.2    Hua, Z.3    Zhengping, J.4
  • 10
    • 84872253011 scopus 로고    scopus 로고
    • Towards scalable key management for secure multicast communication
    • Tseng YM, Yu CH, Wu TY (2012) Towards scalable key management for secure multicast communication. Inf Technol Control 41(2):173–182
    • (2012) Inf Technol Control , vol.41 , Issue.2 , pp. 173-182
    • Tseng, Y.M.1    Yu, C.H.2    Wu, T.Y.3
  • 11
    • 77953352946 scopus 로고    scopus 로고
    • A parallel password-authenticated key exchange protocol for wireless environments
    • Lo JW, Lin SC, Hwang MS (2010) A parallel password-authenticated key exchange protocol for wireless environments. Inf Technol Control 39(2):146–151
    • (2010) Inf Technol Control , vol.39 , Issue.2 , pp. 146-151
    • Lo, J.W.1    Lin, S.C.2    Hwang, M.S.3
  • 12
    • 84872223681 scopus 로고    scopus 로고
    • A secure password-based remote user authentication scheme without smart cards
    • Chen BL, Kuo WC, Wuu LC (2012) A secure password-based remote user authentication scheme without smart cards. Inf Technol Control 41(1):53–59
    • (2012) Inf Technol Control , vol.41 , Issue.1 , pp. 53-59
    • Chen, B.L.1    Kuo, W.C.2    Wuu, L.C.3
  • 13
    • 79959762596 scopus 로고    scopus 로고
    • Secure smart card based password authentication scheme with user anonymity
    • Li CT (2011) Secure smart card based password authentication scheme with user anonymity. Inf Technol Control 40(2):157–162
    • (2011) Inf Technol Control , vol.40 , Issue.2 , pp. 157-162
    • Li, C.T.1
  • 14
    • 80053379375 scopus 로고    scopus 로고
    • A robust remote user authentication scheme using smart card
    • Li CT, Lee CC (2011) A robust remote user authentication scheme using smart card. Inf Technol Control 40(3):236–245
    • (2011) Inf Technol Control , vol.40 , Issue.3 , pp. 236-245
    • Li, C.T.1    Lee, C.C.2
  • 15
    • 84878989011 scopus 로고    scopus 로고
    • An improved password-based remote user authentication protocol without smart cards
    • Jiang Q, Ma J, Li G, Ma Z (2013) An improved password-based remote user authentication protocol without smart cards. Inf Technol Control 42(2):150–158
    • (2013) Inf Technol Control , vol.42 , Issue.2 , pp. 150-158
    • Jiang, Q.1    Ma, J.2    Li, G.3    Ma, Z.4
  • 16
    • 79951785061 scopus 로고    scopus 로고
    • A novel secure bilinear pairing based remote user authentication scheme with smart card. In: IEEE/IFIP International Conference on Embedded and ubiquitous computing (EUC)
    • Bayat M, Farash MS, Movahed A (2010) A novel secure bilinear pairing based remote user authentication scheme with smart card. In: IEEE/IFIP International Conference on Embedded and ubiquitous computing (EUC), pp 578–582
    • (2010) pp 578–582
    • Bayat, M.1    Farash, M.S.2    Movahed, A.3
  • 17
    • 84890424682 scopus 로고    scopus 로고
    • An enhanced authenticated key agreement for session initiation protocol
    • Farash MS, Attari MA (2013) An enhanced authenticated key agreement for session initiation protocol. Inf Technol Control 42(4):333–342
    • (2013) Inf Technol Control , vol.42 , Issue.4 , pp. 333-342
    • Farash, M.S.1    Attari, M.A.2
  • 18
    • 84899645425 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing. Nonlinear Dynam
    • Farash MS, Attari MA (2013) Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing. Nonlinear Dynam. doi:10.1007/s11071-013-1204-1
    • (2013) doi:10.1007/s11071-013-1204-1
    • Farash, M.S.1    Attari, M.A.2
  • 19
    • 84855269122 scopus 로고    scopus 로고
    • On security of a practical three-party key exchange protocol with round efficiency
    • Lee CC, Chang YF (2008) On security of a practical three-party key exchange protocol with round efficiency. Inf Technol Control 37(4):333–335
    • (2008) Inf Technol Control , vol.37 , Issue.4 , pp. 333-335
    • Lee, C.C.1    Chang, Y.F.2
  • 20
    • 84884222500 scopus 로고    scopus 로고
    • Improvement of a three-party password-based key exchange protocol with formal verification
    • Xie Q, Dong N, Tan X, Wong DS, Wang G (2013) Improvement of a three-party password-based key exchange protocol with formal verification. Inf Technol Control 42(3):231–237
    • (2013) Inf Technol Control , vol.42 , Issue.3 , pp. 231-237
    • Xie, Q.1    Dong, N.2    Tan, X.3    Wong, D.S.4    Wang, G.5
  • 21
    • 84880711245 scopus 로고    scopus 로고
    • ECC-based password-authenticated key exchange in the three-party setting
    • Liu T, Pu Q, Zhao Y, Wu S (2013) ECC-based password-authenticated key exchange in the three-party setting. Arab J Sci Eng 68(8):2069–2077
    • (2013) Arab J Sci Eng , vol.68 , Issue.8 , pp. 2069-2077
    • Liu, T.1    Pu, Q.2    Zhao, Y.3    Wu, S.4
  • 22
    • 84896261793 scopus 로고    scopus 로고
    • Security analysis and improvements of a three-party password-based key exchange protocol
    • Tu H, Shen H, He D, Chen J (2014) Security analysis and improvements of a three-party password-based key exchange protocol. Inf Technol Control 43(1):57–63
    • (2014) Inf Technol Control , vol.43 , Issue.1 , pp. 57-63
    • Tu, H.1    Shen, H.2    He, D.3    Chen, J.4
  • 23
    • 80055041764 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key
    • Zhao J, Gu D (2012) Provably secure three-party password-based authenticated key. Inf Sci 184(1):310–323
    • (2012) Inf Sci , vol.184 , Issue.1 , pp. 310-323
    • Zhao, J.1    Gu, D.2
  • 24
    • 84355166674 scopus 로고    scopus 로고
    • Provably secure three-party password authenticated key exchange protocol in the standard model
    • Yang JH, Cao TJ (2012) Provably secure three-party password authenticated key exchange protocol in the standard model. J Systems Softw 85(2):340–350
    • (2012) J Systems Softw , vol.85 , Issue.2 , pp. 340-350
    • Yang, J.H.1    Cao, T.J.2
  • 25
    • 84875929826 scopus 로고    scopus 로고
    • Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
    • Xiong H, Chen Y, Guan Z, Chen Z (2013) Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Inf Sci 235(1):329–340
    • (2013) Inf Sci , vol.235 , Issue.1 , pp. 329-340
    • Xiong, H.1    Chen, Y.2    Guan, Z.3    Chen, Z.4
  • 26
    • 77958106074 scopus 로고    scopus 로고
    • A security weakness in Abdalla et al’.s generic construction of a group key exchange protocol
    • Nam J, Paik J, Won D (2011) A security weakness in Abdalla et al’.s generic construction of a group key exchange protocol. Inf Sci 181(1):234–238
    • (2011) Inf Sci , vol.181 , Issue.1 , pp. 234-238
    • Nam, J.1    Paik, J.2    Won, D.3
  • 27
    • 80055041764 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol
    • Zhao J, Gu D (2012) Provably secure three-party password-based authenticated key exchange protocol. Inf Sci 184(1):310–323
    • (2012) Inf Sci , vol.184 , Issue.1 , pp. 310-323
    • Zhao, J.1    Gu, D.2
  • 28
    • 76349117227 scopus 로고    scopus 로고
    • Simple password-based three-party authenticated key exchange without server public keys
    • Lee TF, Hwang T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inf Sci 180(9):1702–1714
    • (2010) Inf Sci , vol.180 , Issue.9 , pp. 1702-1714
    • Lee, T.F.1    Hwang, T.2
  • 29
    • 79953330802 scopus 로고    scopus 로고
    • Efficient three-party password-based key exchange scheme
    • Lou DC, Huang HF (2010) Efficient three-party password-based key exchange scheme. Int J Commun Systems 24(4):504–512
    • (2010) Int J Commun Systems , vol.24 , Issue.4 , pp. 504-512
    • Lou, D.C.1    Huang, H.F.2
  • 30
    • 84864760957 scopus 로고    scopus 로고
    • Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
    • Wu S, Pu Q, Wang S, He D (2012) Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol. Inf Sci 215(1):83–96
    • (2012) Inf Sci , vol.215 , Issue.1 , pp. 83-96
    • Wu, S.1    Pu, Q.2    Wang, S.3    He, D.4
  • 31
    • 80051506042 scopus 로고    scopus 로고
    • Secure verifier-based three-party key exchange in the random oracle model
    • Chien H (2011) Secure verifier-based three-party key exchange in the random oracle model. J Inf Sci Eng 27(4):1487–1501
    • (2011) J Inf Sci Eng , vol.27 , Issue.4 , pp. 1487-1501
    • Chien, H.1
  • 32
    • 84872314754 scopus 로고    scopus 로고
    • Secure verifier-based three-party password-authenticated key exchange
    • Pu Q, Wang J, Wu S, Fu J (2013) Secure verifier-based three-party password-authenticated key exchange. Peer-to-peer networking and applications 6(1):15–25
    • (2013) Peer-to-peer networking and applications , vol.6 , Issue.1 , pp. 15-25
    • Pu, Q.1    Wang, J.2    Wu, S.3    Fu, J.4
  • 33
    • 84872225527 scopus 로고    scopus 로고
    • Security enhancement on simple three party PAKE protocol
    • Tallapally S (2012) Security enhancement on simple three party PAKE protocol. Inf Technol Control 41(1):15–22
    • (2012) Inf Technol Control , vol.41 , Issue.1 , pp. 15-22
    • Tallapally, S.1
  • 34
    • 84902778355 scopus 로고    scopus 로고
    • An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems
    • Farash MS, Attari MA (2014) An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems. Inf Technol Control 43(2):143–150
    • (2014) Inf Technol Control , vol.43 , Issue.2 , pp. 143-150
    • Farash, M.S.1    Attari, M.A.2
  • 35
    • 84902266968 scopus 로고    scopus 로고
    • An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps, Nonlinear Dynam:
    • Farash MS, Attari MA (2014) An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dynam. doi:10.1007/s11071-014-1304-6
    • (2014) Attari MA
    • Farash, M.S.1
  • 36
    • 84893715932 scopus 로고    scopus 로고
    • Provably secure three-party authenticated key agreement protocol using smart cards
    • Yang H, Zhang Y, Zhou Y, Fu X, Liu H, Vasilakos AV (2014) Provably secure three-party authenticated key agreement protocol using smart cards. Comput Netw 58:29–38
    • (2014) Comput Netw , vol.58 , pp. 29-38
    • Yang, H.1    Zhang, Y.2    Zhou, Y.3    Fu, X.4    Liu, H.5    Vasilakos, A.V.6
  • 37
    • 84879602205 scopus 로고    scopus 로고
    • Efficient three-party key exchange protocols with round efficiency
    • Youn TY, Kang ES, Lee C (2013) Efficient three-party key exchange protocols with round efficiency. Telecommun Systems 52(2):1367–1376
    • (2013) Telecommun Systems , vol.52 , Issue.2 , pp. 1367-1376
    • Youn, T.Y.1    Kang, E.S.2    Lee, C.3
  • 38
    • 68049147074 scopus 로고    scopus 로고
    • A simple three-party password-based key exchange protocol
    • Huang HF (2009) A simple three-party password-based key exchange protocol. Int J Commun Systems 22(7):857–862
    • (2009) Int J Commun Systems , vol.22 , Issue.7 , pp. 857-862
    • Huang, H.F.1
  • 39
    • 79953304485 scopus 로고    scopus 로고
    • Cryptanalysis of a simple three-party password-based key exchange protocol
    • Yoon EJ, Yoo KY (2011) Cryptanalysis of a simple three-party password-based key exchange protocol. Int J Commun Systems 24(4):532–542
    • (2011) Int J Commun Systems , vol.24 , Issue.4 , pp. 532-542
    • Yoon, E.J.1    Yoo, K.Y.2
  • 40
    • 84862680843 scopus 로고    scopus 로고
    • Enhancements of a three-party password-based authenticated key exchange protocol
    • Wu S, Chen K, Zhu Y (2013) Enhancements of a three-party password-based authenticated key exchange protocol. Int Arab J Inf Technol (IAJIT) 10(3):215
    • (2013) Int Arab J Inf Technol (IAJIT) , vol.10 , Issue.3 , pp. 215
    • Wu, S.1    Chen, K.2    Zhu, Y.3
  • 41
    • 77958095782 scopus 로고    scopus 로고
    • A communication-efficient three-party password authenticated key exchange protocol
    • Chang TY, Hwang MS, Yang WP (2011) A communication-efficient three-party password authenticated key exchange protocol. Inf Sci 181(1):217–226
    • (2011) Inf Sci , vol.181 , Issue.1 , pp. 217-226
    • Chang, T.Y.1    Hwang, M.S.2    Yang, W.P.3
  • 42
    • 84888013229 scopus 로고    scopus 로고
    • Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol. J Supercomput
    • Tso R (2013) Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol. J Supercomput. doi:10.1007/s11227-013-0917-8
    • (2013) doi:10.1007/s11227-013-0917-8
    • Tso, R.1
  • 43
    • 26444476977 scopus 로고    scopus 로고
    • Interactive Diffie–Hellman assumptions with applications to password-based authentication
    • Abdalla M, Pointcheval D (2005) Interactive Diffie–Hellman assumptions with applications to password-based authentication. In: Proceedings of FC’05, LNCS 3570, pp 341–356
    • (2005) Proceedings of FC’05, LNCS , vol.3570 , pp. 341-356
    • Abdalla, M.1    Pointcheval, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.