Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
Three-party encrypted key exchange: attacks and a solution
ACM SIGOPS Operating Systems Review
Optimal authentication protocols resistant to password guessing attacks
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Secure key agreement protocols for three-party against guessing attacks
Journal of Systems and Software - Special issue: Software engineering education and training
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences: an International Journal
New directions in cryptography
IEEE Transactions on Information Theory
Kerberos: an authentication service for computer networks
IEEE Communications Magazine
Protecting poorly chosen secrets from guessing attacks
IEEE Journal on Selected Areas in Communications
Journal of Systems and Software
Cryptanalysis of two three-party encrypted key exchange protocols
Computer Standards & Interfaces
Three-party password-based authenticated key exchange protocol based on bilinear pairings
ICICA'10 Proceedings of the First international conference on Information computing and applications
Provably secure three-party password-based authenticated key exchange protocol
Information Sciences: an International Journal
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users
Wireless Personal Communications: An International Journal
Security analysis and enhancement for three-party password-based authenticated key exchange protocol
Security and Communication Networks
An novel three-party authenticated key exchange protocol using one-time key
Journal of Network and Computer Applications
A security-enhanced key agreement protocol based on chaotic maps
Security and Communication Networks
Two ID-based authenticated schemes with key agreement for mobile environments
The Journal of Supercomputing
Hi-index | 0.00 |
In three-party authenticated key exchange protocols, each client shares a secret only with a trusted server with assists in generating a session key used for securely sending messages between two communication clients. Compared with two-party authenticated key exchange protocols where each pair of parties must share a secret with each other, a three-party protocol does not cause any key management problem for the parties. In the literature, mainly there exist three issues in three-party authenticated key exchange protocols are discussed that need to be further improved: (1) to reduce latency, communication steps in the protocol should be as parallel as possible; (2) as the existence of a security-sensitive table on the server side may cause the server to become compromised, the table should be removed; (3) resources required for computation should be as few as possible to avoid the protocol to become an efficiency bottleneck. In various applications over networks, a quick response is required especially by light-weight clients in the mobile e-commerce. In this paper, a round- and computation-efficient three-party authenticated key exchange protocol is proposed which fulfils all of the above mentioned requirements.