Simple three-party password-based key exchange protocol with provable security

被引:0
|
作者
机构
[1] [1,2,Xiong, Hu
[2] Chen, Yanan
[3] Chen, Zhong
[4] Li, Fagen
来源
| 1600年 / Acta Press卷 / 35期
基金
中国国家自然科学基金;
关键词
Public key cryptography - Network security;
D O I
10.2316/Journal.202.2013.1.202-3540
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
相关论文
共 50 条
  • [41] A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Chen, Chien-Ming
    SOFT COMPUTING, 2018, 22 (08) : 2495 - 2506
  • [42] Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
    Sahi, Agee
    Lai, David
    Li, Yan
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2018, 21 (04) : 560 - 581
  • [43] Universally Composable Three Party Password-based Key Exchange Protocol
    Deng Miaolei 1
    中国通信, 2009, 6 (03) : 150 - 155
  • [44] Three-Party Password Authentication and Key Exchange Protocol Based on MLWE
    Guo, Songhui
    Song, Yunfan
    Guo, Song
    Yang, Yeming
    Song, Shuaichao
    SYMMETRY-BASEL, 2023, 15 (09):
  • [45] Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    Nam, Junghyun
    Lee, Youngsook
    Kim, Seungjoo
    Won, Dongho
    INFORMATION SCIENCES, 2007, 177 (06) : 1364 - 1375
  • [46] Highly efficient password-based three-party key exchange in random oracle model
    Chien, Hung-Yu
    Wu, Tzong-Chen
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 69 - 76
  • [47] Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps
    Chien, Hung-Yu
    Wu, Tzong-Chen
    COMPUTER JOURNAL, 2009, 52 (06): : 646 - 655
  • [48] Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Kim, Moonseong
    Paik, Juryon
    Won, Dongho
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3244 - 3260
  • [49] Provably leakage-resilient three-party password-based authenticated key exchange
    Ruan, Ou
    Wang, Qingping
    Wang, Zihao
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (01) : 163 - 173
  • [50] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Cheng-Chi Lee
    Chun-Ta Li
    Che-Wei Hsu
    Nonlinear Dynamics, 2013, 73 : 125 - 132