Communication-efficient three-party protocols for authentication and key agreement

  • Authors:
  • Tian-Fu Lee;Jenn-Long Liu;Mei-Jiun Sung;Shiueng-Bien Yang;Chia-Mei Chen

  • Affiliations:
  • Department of Information Management, Leader University, Tainan 709, Taiwan, ROC;Department of Information Management, National Sun Yat-Sen University, Kaohsiung 804, Taiwan, ROC;Institute of Applied Information, Leader University, Tainan 709, Taiwan, ROC;Department of Computer Science and Information Engineering, Leader University, Tainan 709, Taiwan, ROC;Department of Information Management, National Sun Yat-Sen University, Kaohsiung 804, Taiwan, ROC

  • Venue:
  • Computers & Mathematics with Applications
  • Year:
  • 2009

Quantified Score

Hi-index 0.09

Visualization

Abstract

Encrypted key exchange (EKE) authentication approaches are very important for secure communicating over public networks. In order to solve the security weaknesses three-party EKE, Yeh et al. [H.T. Yeh, H.M. Sun, T. Hwang, Efficient three-party authentication and key agreement protocols resistant to password guessing attacks, Information Science and Engineering 19 (6) (2003) 1059-1070.] proposed two secure and efficient three-party EKE protocols. Based on the protocol developed by Yeh et al., two improved EKE protocols for authentication and key agreement are proposed in this study. The computational costs of the proposed protocols are the same as those of the protocols of Yeh et al. However, the numbers of messages in the communication are fewer than those of the protocols of Yeh et al. Furthermore, the round efficient versions of our proposed protocols are also described.