Three-party encrypted key exchange: attacks and a solution
ACM SIGOPS Operating Systems Review
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Secure key agreement protocols for three-party against guessing attacks
Journal of Systems and Software - Special issue: Software engineering education and training
Layered Access Control Schemes on Watermarked Scalable Media
Journal of VLSI Signal Processing Systems
A round- and computation-efficient three-party authenticated key exchange protocol
Journal of Systems and Software
Security weaknesses of authenticated key agreement protocols
Information Processing Letters
Elliptic curve cryptography: survey and its security applications
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
An novel three-party authenticated key exchange protocol using one-time key
Journal of Network and Computer Applications
Cryptanalysis of an efficient three-party password-based key exchange scheme
International Journal of Communication Systems
Information Sciences: an International Journal
Two ID-based authenticated schemes with key agreement for mobile environments
The Journal of Supercomputing
Hi-index | 0.00 |
For secure communications in public network environments, various three-party authenticated key exchange (3PAKE) protocols are proposed to provide the transaction confidentiality and efficiency. In 2008, Chen et al. proposed a round-efficient 3PAKE protocol to provide the computation and communication efficiency for user authentication and session key exchange. However, we discover that the computation costs and communication loads of their protocol are still high so that it cannot be applied to mobile communications. Therefore, we propose an efficient three-party authenticated key exchange protocol based upon elliptic curve cryptography for mobile-commerce environments. Because the elliptic curve cryptography is used, the proposed 3PAKE protocol has low computation costs and light communication loads. Compared with Chen et al.'s protocol, the proposed protocol is more suitable and practical for mobile-commerce environments.