메뉴 건너뛰기




Volumn 17, Issue 1, 2015, Pages 1-6

Improving security of a communication-efficient three-party password authentication key exchange protocol

Author keywords

Authentication; Cryptanalysis; Guessing attack; Key exchange; Password based; Three party

Indexed keywords

ALUMINUM; SECURE COMMUNICATION;

EID: 84921662977     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (10)

References (43)
  • 2
    • 77958095782 scopus 로고    scopus 로고
    • A communication-efficient three-party password authenticated key exchange protocol
    • T. Y. Chang, M. S. Hwang, and W. P. Yang, "A communication-efficient three-party password authenticated key exchange protocol," Information Sciences, vol. 181, pp. 217-226, 2011.
    • (2011) Information Sciences , vol.181 , pp. 217-226
    • Chang, T.Y.1    Hwang, M.S.2    Yang, W.P.3
  • 3
    • 84872832940 scopus 로고    scopus 로고
    • Improvement of convertible authenticated encryption schemes and its multiple recipients version
    • T. Y. Chang, C. C. Yang and M. S. Hwang, "Improvement of convertible authenticated encryption schemes and its multiple recipients version", International Journal of Security and Its Applications, vol. 6, no. 4, pp. 151-162, 2012.
    • (2012) International Journal of Security and Its Applications , vol.6 , Issue.4 , pp. 151-162
    • Chang, T.Y.1    Yang, C.C.2    Hwang, M.S.3
  • 4
    • 18444399366 scopus 로고    scopus 로고
    • Simple authenticated key agreement and protected password change protocol
    • T. Y. Chang, W. P. Yang, M. S. Hwang, "Simple authenticated key agreement and protected password change protocol", Computers & Mathematics with Applications, vol. 49, pp. 703-714, 2005.
    • (2005) Computers & Mathematics with Applications , vol.49 , pp. 703-714
    • Chang, T.Y.1    Yang, W.P.2    Hwang, M.S.3
  • 5
    • 84888003168 scopus 로고    scopus 로고
    • Towards secure and efficient user authentication scheme using smart card for multi-server environments
    • T. Y. Chen, C. C. Lee, M. S. Hwang, J. K. Jan, "Towards secure and efficient user authentication scheme using smart card for multi-server environments," The Journal of Supercomputing, vol. 66, no. 2, pp. 1008-1032, 2013.
    • (2013) The Journal of Supercomputing , vol.66 , Issue.2 , pp. 1008-1032
    • Chen, T.Y.1    Lee, C.C.2    Hwang, M.S.3    Jan, J.K.4
  • 6
    • 84903886932 scopus 로고    scopus 로고
    • Cryptanalysis of Tan's improvement on a password authentication scheme for multi-server environments
    • T. H. Feng, C. H. Ling, and M. S. Hwang, "Cryptanalysis of Tan's improvement on a password authentication scheme for multi-server environments," International Journal of Network Security, vol. 16, no. 4, pp. 318-321, 2014.
    • (2014) International Journal of Network Security , vol.16 , Issue.4 , pp. 318-321
    • Feng, T.H.1    Ling, C.H.2    Hwang, M.S.3
  • 7
    • 80054052709 scopus 로고    scopus 로고
    • Weaknesses of a remote user password authentication scheme using smart card
    • D. He, J. Chen, and J. Hu, "Weaknesses of a remote user password authentication scheme using smart card," International Journal of Network Security, vol. 13, no. 1, pp. 58-60, 2011.
    • (2011) International Journal of Network Security , vol.13 , Issue.1 , pp. 58-60
    • He, D.1    Chen, J.2    Hu, J.3
  • 8
    • 59649086399 scopus 로고    scopus 로고
    • Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
    • H. C. Hsiang and W. K. Shih, "Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards," Computer Communications, vol. 32, no. 4, pp. 649-652, 2009.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 649-652
    • Hsiang, H.C.1    Shih, W.K.2
  • 9
    • 84865219379 scopus 로고    scopus 로고
    • Exploiting hash functions to intensify the remote user authentication scheme
    • W. B. Hsieh and J. S. Leu, "Exploiting hash functions to intensify the remote user authentication scheme," Computers & Security, vol. 31, no. 6, pp. 791-798, 2012.
    • (2012) Computers & Security , vol.31 , Issue.6 , pp. 791-798
    • Hsieh, W.B.1    Leu, J.S.2
  • 11
    • 0000362936 scopus 로고    scopus 로고
    • An improvement of SPLICE/AS in WIDE against guessing attack
    • M. S. Hwang, C. C. Lee, Y. L. Tang, "An improvement of SPLICE/AS in WIDE against guessing attack", International Journal of Informatica, vol. 12, no. 2, pp.297-302, 2001.
    • (2001) International Journal of Informatica , vol.12 , Issue.2 , pp. 297-302
    • Hwang, M.S.1    Lee, C.C.2    Tang, Y.L.3
  • 12
    • 71649104505 scopus 로고    scopus 로고
    • DoS-resistant ID-based password authentication scheme using smart cards
    • M. S. Hwang, S. K. Chong, T. Y. Chen, "DoS-resistant ID-based password authentication scheme using smart cards", Journal of Systems and Software, vol. 83, pp. 163-172, 2010.
    • (2010) Journal of Systems and Software , vol.83 , pp. 163-172
    • Hwang, M.S.1    Chong, S.K.2    Chen, T.Y.3
  • 13
    • 0031144513 scopus 로고    scopus 로고
    • Authenticated key-exchange in a mobile radio network
    • M. S. Hwang and C. H. Lee, "Authenticated key-exchange in a mobile radio network", European Transactions on Telecommunications, vo1. 8, no.3, pp.265-269, 1997.
    • (1997) European Transactions on Telecommunications , vol.8 , Issue.3 , pp. 265-269
    • Hwang, M.S.1    Lee, C.H.2
  • 14
    • 0037038584 scopus 로고    scopus 로고
    • Improved Yen-Joye's authenticated multiple-key agreement protocol
    • M. S. Hwang, C. W. Lin, C. C. Lee, "Improved Yen-Joye's authenticated multiple-key agreement protocol", IEE Electronics Letters, vol. 38, no. 23, pp. 1429-1431, 2002.
    • (2002) IEE Electronics Letters , vol.38 , Issue.23 , pp. 1429-1431
    • Hwang, M.S.1    Lin, C.W.2    Lee, C.C.3
  • 15
    • 84876023679 scopus 로고    scopus 로고
    • Two-party authenticated multiple-key agreement based on elliptic curve discrete logarithm problem
    • L. C. Huang, M. S. Hwang, "Two-party authenticated multiple-key agreement based on elliptic curve discrete logarithm problem", International Journal of Smart Home, vol. 7, no. 1, pp. 9-18, 2013.
    • (2013) International Journal of Smart Home , vol.7 , Issue.1 , pp. 9-18
    • Huang, L.C.1    Hwang, M.S.2
  • 16
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 17
    • 78649433409 scopus 로고    scopus 로고
    • Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy
    • C. C. Lee, R. X. Chang, and H. J. Ko, "Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy," International Journal of Foundations of Computer Science, vol. 21, no. 6, pp. 979-991, 2010.
    • (2010) International Journal of Foundations of Computer Science , vol.21 , Issue.6 , pp. 979-991
    • Lee, C.C.1    Chang, R.X.2    Ko, H.J.3
  • 18
    • 84855269122 scopus 로고    scopus 로고
    • On security of a practical three-party key exchange protocol with round efficiency
    • C. C. Lee and Y. F. Chang, "On security of a practical three-party key exchange protocol with round efficiency," Information Technology and Control, vol. 37, no. 4, pp. 333-335, 2008.
    • (2008) Information Technology and Control , vol.37 , Issue.4 , pp. 333-335
    • Lee, C.C.1    Chang, Y.F.2
  • 19
    • 84870003598 scopus 로고    scopus 로고
    • A computation-efficient three-party encrypted key exchange protocol
    • C. C. Lee, S. D. Chen, and C. L. Chen, "A computation-efficient three-party encrypted key exchange protocol," Applied Mathematics & Information Sciences, vol. 6, no. 3 pp. 573-579, 2012.
    • (2012) Applied Mathematics & Information Sciences , vol.6 , Issue.3 , pp. 573-579
    • Lee, C.C.1    Chen, S.D.2    Chen, C.L.3
  • 21
    • 84879782333 scopus 로고    scopus 로고
    • A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    • C. C. Lee, C. T. Li, and C. W. Hsu, "A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps," Nonlinear Dynamics, vol. 73, no. 1, pp. 125-132, 2013.
    • (2013) Nonlinear Dynamics , vol.73 , Issue.1 , pp. 125-132
    • Lee, C.C.1    Li, C.T.2    Hsu, C.W.3
  • 22
    • 84875095444 scopus 로고    scopus 로고
    • Guessing attacks on strong-password authentication protocol
    • C. C. Lee, C. H. Liu, and M. S. Hwang, "Guessing attacks on strong-password authentication protocol", International Journal of Network Security, vol. 15, no. 1, pp. 64-67, 2013.
    • (2013) International Journal of Network Security , vol.15 , Issue.1 , pp. 64-67
    • Lee, C.C.1    Liu, C.H.2    Hwang, M.S.3
  • 23
    • 67649791953 scopus 로고    scopus 로고
    • Communication-efficient three-party protocols for authentication and key agreement
    • T. F. Lee, J. L. Liu, M. J. Sung, S. B. Yang, and C. M. Chen, "Communication-efficient three-party protocols for authentication and key agreement," Computers & Mathematics with Applications, vol. 58, no. 4, pp. 641-648, 2009.
    • (2009) Computers & Mathematics with Applications , vol.58 , Issue.4 , pp. 641-648
    • Lee, T.F.1    Liu, J.L.2    Sung, M.J.3    Yang, S.B.4    Chen, C.M.5
  • 24
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • T. F. Lee, T. Hwang, and C. L. Lin, "Enhanced three-party encrypted key exchange without server public keys," Computers & Security, vol. 23, no. 7, pp. 571-577, 2004.
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 25
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • C. T. Li and M. S. Hwang, "An efficient biometrics-based remote user authentication scheme using smart cards", Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1-5, 2010.
    • (2010) Journal of Network and Computer Applications , vol.33 , Issue.1 , pp. 1-5
    • Li, C.T.1    Hwang, M.S.2
  • 26
    • 46749099079 scopus 로고    scopus 로고
    • A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular Ad Hoc networks
    • C. T. Li, M. S. Hwang, Y. P. Chu, "A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular Ad Hoc networks", Computer Communications, vol. 31, no. 12, pp. 2803-2814, 2008.
    • (2008) Computer Communications , vol.31 , Issue.12 , pp. 2803-2814
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 27
    • 49549085074 scopus 로고    scopus 로고
    • Improving the security of a secure anonymous routing protocol with authenticated key exchange for Ad Hoc networks
    • C. T. Li, M. S. Hwang, Y. P. Chu, "Improving the security of a secure anonymous routing protocol with authenticated key exchange for Ad Hoc networks", International Journal of Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, 2008.
    • (2008) International Journal of Computer Systems Science and Engineering , vol.23 , Issue.3 , pp. 227-234
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 28
  • 30
    • 28844488495 scopus 로고    scopus 로고
    • A user authentication system using back-propagation network
    • I. C. Lin, H. H. Ou, M. S. Hwang, "A user authentication system using back-propagation network", Neural Computing & Applications, vol. 14, no. 3, pp. 243-249, 2005.
    • (2005) Neural Computing & Applications , vol.14 , Issue.3 , pp. 243-249
    • Lin, I.C.1    Ou, H.H.2    Hwang, M.S.3
  • 31
    • 80052492581 scopus 로고    scopus 로고
    • An advanced password authenticated key exchange protocol for imbalanced wireless networks
    • J. W. Lo, J. Z. Lee, M, S. Hwang, Y. P. Chu, "An advanced password authenticated key exchange protocol for imbalanced wireless networks", Journal of Internet Technology, vol. 11, no. 7, pp. 997-1004, 2010.
    • (2010) Journal of Internet Technology , vol.11 , Issue.7 , pp. 997-1004
    • Lo, J.W.1    Lee, J.Z.2    Hwang, M.S.3    Chu, Y.P.4
  • 32
    • 77953352946 scopus 로고    scopus 로고
    • A parallel password-authenticated key exchange protocol for wireless environments
    • J. W. Lo, S. C. Lin, M. S. Hwang, "A parallel password-authenticated key exchange protocol for wireless environments", Information Technology and Control, vol. 39, no. 2, pp. 146-151, 2010.
    • (2010) Information Technology and Control , vol.39 , Issue.2 , pp. 146-151
    • Lo, J.W.1    Lin, S.C.2    Hwang, M.S.3
  • 33
    • 0242552286 scopus 로고    scopus 로고
    • Security enhancement for the timestamp-based password authentication scheme using smart cards
    • J. J. Shen, C. W. Lin, M. S. Hwang, "Security enhancement for the timestamp-based password authentication scheme using smart cards", Computers & Security, vol. 22, no. 7, pp. 591-595, 2003.
    • (2003) Computers & Security , vol.22 , Issue.7 , pp. 591-595
    • Shen, J.J.1    Lin, C.W.2    Hwang, M.S.3
  • 34
    • 77958098545 scopus 로고    scopus 로고
    • Pass-go: aproposal to improve the usability of graphical passwords
    • H. Tao and C. Adams, "Pass-go: aproposal to improve the usability of graphical passwords,"International Journal of Network Security, vol. 7, no. 2, pp. 273-292, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.2 , pp. 273-292
    • Tao, H.1    Adams, C.2
  • 35
    • 40949152760 scopus 로고    scopus 로고
    • Password authentication schemes: current status and key issues
    • C. S. Tsai, C. C. Lee, and M. S. Hwang, "Password authentication schemes: current status and key issues,"International Journal of Network Security, vol. 3, no. 2, pp. 101-115, 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.2 , pp. 101-115
    • Tsai, C.S.1    Lee, C.C.2    Hwang, M.S.3
  • 36
    • 70349819161 scopus 로고    scopus 로고
    • Cryptanalysis of two improved password authentication schemes using smart cards
    • R. C. Wang and C. C. Yang, "Cryptanalysis of two improved password authentication schemes using smart cards," International Journal of Network Security, vol. 3, no. 3, pp. 283-285, 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.3 , pp. 283-285
    • Wang, R.C.1    Yang, C.C.2
  • 37
    • 33645274667 scopus 로고    scopus 로고
    • A secure strong-password authentication protocol
    • H. C. Wu, M. S. Hwang, C. H. Liu, "A secure strong-password authentication protocol", Fundamenta Informaticae, vol. 68, pp. 399-406, 2005.
    • (2005) Fundamenta Informaticae , vol.68 , pp. 399-406
    • Wu, H.C.1    Hwang, M.S.2    Liu, C.H.3
  • 38
    • 84864760957 scopus 로고    scopus 로고
    • Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
    • S. Wu, Q. Pu, S. Wang, and D. He, "Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol," Information Sciences, vol. 215, pp. 83-96, 2012.
    • (2012) Information Sciences , vol.215 , pp. 83-96
    • Wu, S.1    Pu, Q.2    Wang, S.3    He, D.4
  • 39
    • 4243165683 scopus 로고    scopus 로고
    • Cryptanalysis of simple authenticated key agreement protocols
    • C. C. Yang, T. Y. Chang, M. S. Hwang, "Cryptanalysis of simple authenticated key agreement protocols", IEICE Transactions on Foundations, vol. E87-A, no. 8, pp. 2174-2176, 2004.
    • (2004) IEICE Transactions on Foundations , vol.E87-A , Issue.8 , pp. 2174-2176
    • Yang, C.C.1    Chang, T.Y.2    Hwang, M.S.3
  • 40
    • 84875321481 scopus 로고    scopus 로고
    • An improvement on a three-party password-based key exchange protocol using weil pairing
    • Y. Zeng, J. Ma, and M. Sangjae, "An improvement on a three-party password-based key exchange protocol using weil pairing," International Journal of Network Security, vol. 11, no. 1, pp. 17-22, 2010.
    • (2010) International Journal of Network Security , vol.11 , Issue.1 , pp. 17-22
    • Zeng, Y.1    Ma, J.2    Sangjae, M.3
  • 41
    • 80055041764 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol
    • J. Zhao and D. Gu, "Provably secure three-party password-based authenticated key exchange protocol," Information Sciences, vol. 184, no. 1, pp. 310-323, 2012.
    • (2012) Information Sciences , vol.184 , Issue.1 , pp. 310-323
    • Zhao, J.1    Gu, D.2
  • 42
    • 34250204664 scopus 로고    scopus 로고
    • Security management in the next generation wireless networks
    • Y. Zhang and M. Fujise, "Security management in the next generation wireless networks," International Journal of Network Security, vol. 3, no. 1, pp. 1-7, 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.1 , pp. 1-7
    • Zhang, Y.1    Fujise, M.2
  • 43
    • 84903894042 scopus 로고    scopus 로고
    • A simple password authentication scheme based on geometric hashing function
    • X. Zhuang, C. C. Chang, Z. H. Wang, Y. Zhu, "A simple password authentication scheme based on geometric hashing function," International Journal of Network Security, vol. 16, no. 4, pp. 237-243, 2014.
    • (2014) International Journal of Network Security , vol.16 , Issue.4 , pp. 237-243
    • Zhuang, X.1    Chang, C.C.2    Wang, Z.H.3    Zhu, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.