Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
Undetectable on-line password guessing attacks
ACM SIGOPS Operating Systems Review
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Three-party encrypted key exchange: attacks and a solution
ACM SIGOPS Operating Systems Review
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Optimal authentication protocols resistant to password guessing attacks
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Password-based user authentication and key distribution protocols for client-server applications
Journal of Systems and Software
Secure key agreement protocols for three-party against guessing attacks
Journal of Systems and Software - Special issue: Software engineering education and training
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences: an International Journal
Three weaknesses in a simple three-party key exchange protocol
Information Sciences: an International Journal
Computer Standards & Interfaces
Enhanced password-based simple three-party key exchange protocol
Computers and Electrical Engineering
Communication-efficient three-party protocols for authentication and key agreement
Computers & Mathematics with Applications
Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps
The Computer Journal
An off-line dictionary attack on a simple three-party key exchange protocol
IEEE Communications Letters
Simple authenticated key agreement and protected password change protocol
Computers & Mathematics with Applications
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Protecting poorly chosen secrets from guessing attacks
IEEE Journal on Selected Areas in Communications
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
Information Sciences: an International Journal
Provably secure three-party password-based authenticated key exchange protocol
Information Sciences: an International Journal
Information Sciences: an International Journal
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
Information Sciences: an International Journal
Cryptanalysis of an efficient three-party password-based key exchange scheme
International Journal of Communication Systems
HOTA: Handover optimized ticket-based authentication in network-based mobility management
Information Sciences: an International Journal
Information Sciences: an International Journal
Provably secure three party encrypted key exchange scheme with explicit authentication
Information Sciences: an International Journal
The Journal of Supercomputing
An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol
Journal of Computational Methods in Sciences and Engineering
Hi-index | 0.08 |
Three-party password authenticated key exchange (3PAKE) protocols allow two users (clients) to establish a session key through an authentication server over an insecure channel. Clients only share an easy-to-remember password with the trusted server. In the related literature, most schemes employ the server public keys to ensure the identities of both the servers and symmetric cryptosystems to encrypt the messages. This paper describes an efficient 3PAKE based on LHL-3PAKE proposed by Lee et al. Our 3PAKE requires neither the server public keys nor symmetric cryptosystems such as DES. The formal proof of security of our 3PAKE is based on the computational Diffie-Hellman assumption in the random oracle model along with a parallel version of the proposed 3PAKE. The comparisons have shown that our 3PAKE is more practical than other 3PAKEs.