메뉴 건너뛰기




Volumn 2014, Issue , 2014, Pages

Password-only authenticated three-party key exchange proven secure against insider dictionary attacks

Author keywords

[No Author keywords available]

Indexed keywords

ARTICLE; BOOK; COMPUTER SECURITY; INFORMATION STORAGE; INTERNET PROTOCOL; ONLINE SYSTEM; PASSWORD ONLY AUTHENTICATED THREE PARTY KEY EXCHANGE; ALGORITHM; COMPUTER NETWORK; HUMAN; INTERNET; WIRELESS COMMUNICATION;

EID: 84929941120     PISSN: 23566140     EISSN: 1537744X     Source Type: Journal    
DOI: 10.1155/2014/802359     Document Type: Article
Times cited : (4)

References (38)
  • 1
    • 84971660027 scopus 로고    scopus 로고
    • Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
    • Springer, Berlin, Germany
    • W. Wang and L. Hu, "Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols, " in Progress in Cryptology-INDOCRYPT 2006, vol. 4329 of Lecture Notes in Computer Science, pp. 118-132, Springer, Berlin, Germany, 2006.
    • (2006) Progress in Cryptology-INDOCRYPT 2006, 4329 of Lecture Notes in Computer Science , pp. 118-132
    • Wang, W.1    Hu, L.2
  • 2
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • H. Guo, Z. Li, Y. Mu, and X. Zhang, "Cryptanalysis of simple three-party key exchange protocol, " Computers and Security, vol. 27, no. 1-2, pp. 16-21, 2008.
    • (2008) Computers and Security , vol.27 , Issue.1-2 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 3
    • 63649090970 scopus 로고    scopus 로고
    • An offline dictionary attack on a simple three-party key exchange protocol
    • J. Nam, J. Paik, H. Kang, U. M. Kim, and D. Won, "An offline dictionary attack on a simple three-party key exchange protocol, " IEEE Communications Letters, vol. 13, no. 3, pp. 205-207, 2009.
    • (2009) IEEE Communications Letters , vol.13 , Issue.3 , pp. 205-207
    • Nam, J.1    Paik, J.2    Kang, H.3    Kim, U.M.4    Won, D.5
  • 4
    • 79953304485 scopus 로고    scopus 로고
    • Cryptanalysis of a simple three-party password-based key exchange protocol
    • E. Yoon and K. Yoo, "Cryptanalysis of a simple three-party password-based key exchange protocol, " International Journal of Communication Systems, vol. 24, no. 4, pp. 532-542, 2011.
    • (2011) International Journal of Communication Systems , vol.24 , Issue.4 , pp. 532-542
    • Yoon, E.1    Yoo, K.2
  • 5
    • 84891596035 scopus 로고    scopus 로고
    • Dictionary attacks against password-based authenticated three-party key exchange protocols
    • J. Nam, K. K. R. Choo, M. Kim, J. Paik, and D. Won, "Dictionary attacks against password-based authenticated three-party key exchange protocols, " KSII Transactions on Internet and Information Systems, vol. 7, no. 12, pp. 3244-3260, 2013.
    • (2013) KSII Transactions on Internet and Information Systems , vol.7 , Issue.12 , pp. 3244-3260
    • Nam, J.1    Choo, K.K.R.2    Kim, M.3    Paik, J.4    Won, D.5
  • 6
    • 84925253457 scopus 로고    scopus 로고
    • On the security of a simple three-party key exchange protocol without servers public keys
    • Article ID 479534, 7 pages
    • J. Nam, K. K. R. Choo, M. Park, J. Paik, and D. Won, "On the security of a simple three-party key exchange protocol without servers public keys, " The Scientific World Journal, vol. 2014, Article ID 479534, 7 pages, 2014.
    • (2014) The Scientific World Journal , vol.2014
    • Nam, J.1    Choo, K.K.R.2    Park, M.3    Paik, J.4    Won, D.5
  • 9
    • 33645734992 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • M. Abdalla, P. Fouque, and D. Pointcheval, "Password-based authenticated key exchange in the three-party setting, " IEE Proceedings-Information Security, vol. 153, no. 1, pp. 27-39, 2006.
    • (2006) IEE Proceedings-Information Security , vol.153 , Issue.1 , pp. 27-39
    • Abdalla, M.1    Fouque, P.2    Pointcheval, D.3
  • 11
    • 21644467750 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
    • H. Wen, T. Lee, and T. Hwang, "Provably secure three-party password-based authenticated key exchange protocol using Weil pairing, " IEE Proceedings-Communications, vol. 152, no. 2, pp. 138-143, 2005.
    • (2005) IEE Proceedings-Communications , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.1    Lee, T.2    Hwang, T.3
  • 12
    • 78650717256 scopus 로고    scopus 로고
    • Password authenticated key exchange based on RSA in the three-party settings
    • Provable Security, Springer, Berlin, Germany
    • E. Dongna, Q. Cheng, and C. Ma, "Password authenticated key exchange based on RSA in the three-party settings, " in Provable Security, vol. 5848of LectureNotes in Computer Science, pp. 168-182, Springer, Berlin, Germany, 2009.
    • (2009) LectureNotes in Computer Science , vol.5848 , pp. 168-182
    • Dongna, E.1    Cheng, Q.2    Ma, C.3
  • 13
    • 76349117227 scopus 로고    scopus 로고
    • Simple password-based three-party authenticated key exchange without server public keys
    • T. Lee and T. Hwang, "Simple password-based three-party authenticated key exchange without server public keys, " Information Sciences, vol. 180, no. 9, pp. 1702-1714, 2010.
    • (2010) Information Sciences , vol.180 , Issue.9 , pp. 1702-1714
    • Lee, T.1    Hwang, T.2
  • 14
    • 79960769127 scopus 로고    scopus 로고
    • How to construct secure and efficient three-party password-based authenticated key exchange protocols
    • Springer, Berlin, Germany
    • W. Wang, L. Hu, and Y. Li, "How to construct secure and efficient three-party password-based authenticated key exchange protocols, " in Information Security and Cryptology, vol. 6584 of LectureNotes in Computer Science, pp. 218-235, Springer, Berlin, Germany, 2011.
    • (2011) Information Security and Cryptology, 6584 of LectureNotes in Computer Science , pp. 218-235
    • Wang, W.1    Hu, L.2    Li, Y.3
  • 15
    • 81255208426 scopus 로고    scopus 로고
    • On a simple three-partypassword-based key exchange protocol"
    • C. LinandT. Hwang, "On"a simple three-partypassword-based key exchange protocol", " International Journal of Communication Systems, vol. 24, no. 11, pp. 1520-1532, 2011.
    • (2011) International Journal of Communication Systems , vol.24 , Issue.11 , pp. 1520-1532
    • LinandT. Hwang, C.1
  • 16
    • 84864760957 scopus 로고    scopus 로고
    • Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
    • S. Wu, Q. Pu, S. Wang, and D. He, "Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol, " Information Sciences, vol. 215, pp. 83-96, 2012.
    • (2012) Information Sciences , vol.215 , pp. 83-96
    • Wu, S.1    Pu, Q.2    Wang, S.3    He, D.4
  • 17
    • 84900022765 scopus 로고    scopus 로고
    • Password-only authenticated three-party key exchange with provable security in the standard model
    • Article ID 825072, 11 pages, 2014
    • J. Nam, K. K. R. Choo, J. Kim, H. Kang, J. Paik, and D. Won, "Password-only authenticated three-party key exchange with provable security in the standard model, " The Scientific World Journal, vol. 2014, Article ID 825072, 11 pages, 2014.
    • (2014) The Scientific World Journal
    • Nam, J.1    Choo, K.K.R.2    Kim, J.3    Kang, H.4    Paik, J.5    Won, D.6
  • 18
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • J. Nam, Y. Lee, S. Kim, and D. Won, "Security weakness in a three-party pairing-based protocol for password authenticated key exchange, " Information Sciences, vol. 177, no. 6, pp. 1364-1375, 2007.
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 20
    • 80055041764 scopus 로고    scopus 로고
    • Provably secure three-party passwordbased authenticated key exchange protocol
    • J. Zhao and D. Gu, "Provably secure three-party passwordbased authenticated key exchange protocol, " Information Sciences, vol. 184, no. 1, pp. 310-323, 2012.
    • (2012) Information Sciences , vol.184 , Issue.1 , pp. 310-323
    • Zhao, J.1    Gu, D.2
  • 21
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution, "
    • ACM
    • C. Lin, H. Sun, and T. Hwang, "Three-party encrypted key exchange: attacks and a solution, " ACM SIGOPS Operating Systems Review, vol. 34, no. 4, pp. 12-20, 2000.
    • (2000) SIGOPS Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.1    Sun, H.2    Hwang, T.3
  • 22
    • 69649092978 scopus 로고    scopus 로고
    • Provably secure password-based threeparty key exchange with optimal message steps
    • H. Chien and T. Wu, "Provably secure password-based threeparty key exchange with optimal message steps, " The Computer Journal, vol. 52, no. 6, pp. 646-655, 2009.
    • (2009) The Computer Journal , vol.52 , Issue.6 , pp. 646-655
    • Chien, H.1    Wu, T.2
  • 23
    • 68849121226 scopus 로고    scopus 로고
    • Cryptanalysis of two three-party encrypted key exchange protocols
    • N. W. Lo and K. Yeh, "Cryptanalysis of two three-party encrypted key exchange protocols, " Computer Standards and Interfaces, vol. 31, no. 6, pp. 1167-1174, 2009.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.6 , pp. 1167-1174
    • Lo, N.W.1    Yeh, K.2
  • 24
    • 79953330802 scopus 로고    scopus 로고
    • Efficient three-party password-based key exchange scheme
    • D. Lou and H. Huang, "Efficient three-party password-based key exchange scheme, " International Journal of Communication Systems, vol. 24, no. 4, pp. 504-512, 2011.
    • (2011) International Journal of Communication Systems , vol.24 , Issue.4 , pp. 504-512
    • Lou, D.1    Huang, H.2
  • 25
    • 84355166674 scopus 로고    scopus 로고
    • Provably secure three-party password authenticated key exchange protocol in the standard model
    • J. Yang and T. Cao, "Provably secure three-party password authenticated key exchange protocol in the standard model, " Journal of Systems and Software, vol. 85, no. 2, pp. 340-350, 2012.
    • (2012) Journal of Systems and Software , vol.85 , Issue.2 , pp. 340-350
    • Yang, J.1    Cao, T.2
  • 26
    • 84876132598 scopus 로고    scopus 로고
    • Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme
    • S. Wu, K. Chen, Q. Pu, and Y. Zhu, "Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme, " International Journal of Communication Systems, vol. 26, no. 5, pp. 674-686, 2013.
    • (2013) International Journal of Communication Systems , vol.26 , Issue.5 , pp. 674-686
    • Wu, S.1    Chen, K.2    Pu, Q.3    Zhu, Y.4
  • 27
    • 84876863193 scopus 로고    scopus 로고
    • Provably secure three party encrypted key exchange scheme with explicit authentication
    • H. Tsai and C. Chang, "Provably secure three party encrypted key exchange scheme with explicit authentication, " Information Sciences, vol. 238, pp. 242-249, 2013.
    • (2013) Information Sciences , vol.238 , pp. 242-249
    • Tsai, H.1    Chang, C.2
  • 30
    • 71449093776 scopus 로고    scopus 로고
    • Efficient and secure authenticated key exchange using weak passwords
    • article 3, 39 pages
    • J. Katz, R. Ostrovsky, and M. Yung, "Efficient and secure authenticated key exchange using weak passwords, " Journal of the ACM, vol. 57, no. 1, article 3, 39 pages, 2010.
    • (2010) Journal of the ACM , vol.57 , Issue.1
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 32
    • 33645605444 scopus 로고    scopus 로고
    • The PAK suite: Protocols for passwordauthenticated key exchange
    • P. MacKenzie, "The PAK suite: protocols for passwordauthenticated key exchange, " Contributions to IEEE P1363. 2, 2002.
    • (2002) Contributions to IEEE P1363.2
    • MacKenzie, P.1
  • 34
    • 35048866891 scopus 로고    scopus 로고
    • New security results on encrypted key exchange
    • Public Key Cryptography, Springer, Berlin, Germany
    • E. Bresson, O. Chevassut, and D. Pointcheval, "New security results on encrypted key exchange, " in Public Key Cryptography, vol. 2947 of Lecture Notes in Computer Science, pp. 145-158, Springer, Berlin, Germany, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2947 , pp. 145-158
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 37
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols
    • The Cryptographers Track at the RSA Conference, Springer, Berlin, Germany
    • M. Abdalla and D. Pointcheval, "Simple password-based encrypted key exchange protocols, " in The Cryptographers Track at the RSA Conference, vol. 3376 of Lecture Notes in Computer Science, pp. 191-208, Springer, Berlin, Germany, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 191-208
    • Abdalla, M.1    Pointcheval, D.2
  • 38
    • 34548765558 scopus 로고    scopus 로고
    • A proof of revised Yahalom protocol in the Bellare and Rogaway (1993) model
    • K. K. R. Choo, "A proof of revised Yahalom protocol in the Bellare and Rogaway (1993) model, " Computer Journal, vol. 50, no. 5, pp. 591-601, 2007.
    • (2007) Computer Journal , vol.50 , Issue.5 , pp. 591-601
    • Choo, K.K.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.