Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
Three-party encrypted key exchange: attacks and a solution
ACM SIGOPS Operating Systems Review
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Optimal authentication protocols resistant to password guessing attacks
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
An Adaptable and Reliable Authentication Protocol for Communication Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
Efficient protocols secure against guessing and replay attacks
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Efficient three-party key exchange using smart cards
IEEE Transactions on Consumer Electronics
Provably secure three-party authenticated key agreement protocol using smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
This paper proposes new efficient and secure three-party token-based authenticated key establishment (3TAKE) protocols based on symmetric key cryptosystem to minimize the complexity of symmetric key encryption/decryption operation among all users and fit three-party communication. In 3TAKE, the number of exponentiations among three parties is same or reduced by about 34 - 60% and the number of symmetric key encryption/decryption operations among three parties is reduced by about 34 - 67% compared with the related protocols, respectively. Furthermore, the number of rounds is one round smaller than the related protocols and the asymmetric key encryption/decryption operations do not need to establish a session key and authenticate between two users and a server.