Lower bounds on messages and rounds for network authentication protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
Undetectable on-line password guessing attacks
ACM SIGOPS Operating Systems Review
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Three-party encrypted key exchange: attacks and a solution
ACM SIGOPS Operating Systems Review
KryptoKnight Authentication and Key Distribution System
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Relations Among Notions of Security for Public-Key Encryption Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Optimal authentication protocols resistant to password guessing attacks
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review
Secure key agreement protocols for three-party against guessing attacks
Journal of Systems and Software - Special issue: Software engineering education and training
Note on Robust and Simple Authentication Protocol
The Computer Journal
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Three weaknesses in a simple three-party key exchange protocol
Information Sciences: an International Journal
Selectively Convertible Authenticated Encryption in the Random Oracle Model
The Computer Journal
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
A password-based three-party encrypted key exchange (3PEKE) is a protocol enables any pair of two registered clients to establish session keys via the help of a trusted server such that each client shares only one password with the server. This approach greatly improves the scalability of key agreement protocol in distributed environments, and provides great user convenience. This paper proposes a new password-based 3PEKE scheme with only four message steps, which is the minimum among the published works. The proposed scheme is secure in the random oracle model.