Cryptanalysis of a Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography

  • Authors:
  • Qiong Pu;Xiuying Zhao;Jianmin Ding

  • Affiliations:
  • -;-;-

  • Venue:
  • ICRCCS '09 Proceedings of the 2009 International Conference on Research Challenges in Computer Science
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Quite recently, Yang et al. presented an efficient three-party authenticated key exchange protocol based upon elliptic curve cryptography for mobile-commerce environments. In this paper, we demonstrate that Yang et al's three-party authenticated protocol is potentially vulnerable to an unknown key-share attack. Thereafter, we suggest a countermeasure to resist our described attacks while the merits of the original protocol are left unchanged. On the other hand, through this work, we also highlight that the existence of insider attacks needs to be taken into consideration in the three-party setting.