Security design for three-party encrypted key exchange protocol using smart cards
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Enhanced Three-Round Smart Card-Based Key Exchange Protocol
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
A simple and efficient key exchange scheme against the smart card loss problem
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Token-based authenticated key establishment protocols for three-party communication
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Provably secure three-party authenticated key agreement protocol using smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.43 |
In this paper, we propose a novel three-party key exchange scheme using smart cards. The main merits of our scheme include: (1) there is no need for verification, passwords or shared keys table in the trusted server; (2) users can freely choose and change their own passwords, (3) the communication and computation cost is very low; (4) two users can authenticate each other by the trusted server; (5) it generates a session key agreed between two users; (6) it is a nonce-based scheme which does not have a serious time-synchronization problem.