Enhanced three-round smart card-based key exchange protocol

被引:0
|
作者
Yoon, Eun-Jun [1 ]
Yoo, Kee-Young [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
关键词
cryptography; authentication; password; key exchange; smart card; cryptanalysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In 2007, Kwon et al. proposed a three-round protocol, SKE, for smart card-based key exchange in the three-party setting which provides both key independence and forward secrecy. This paper demonstrates the vulnerability of the SKE protocol and then presents an improvement to repair the security flaws of the SKE protocol.
引用
收藏
页码:507 / 515
页数:9
相关论文
共 50 条
  • [21] Provably Unlinkable Smart Card-based Payments
    Bursuc, Sergiu
    Horne, Ross
    Mauw, Sjouke
    Yurkov, Semen
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1392 - 1406
  • [22] Cryptanalysis of hash based multi-server key exchange protocol using smart card
    Tomar A.
    Dhar J.
    [J]. International Journal of Information Technology, 2019, 11 (4) : 691 - 696
  • [23] Smart card-based secure authentication protocol in multi-server IoT environment
    Bae, Won-il
    Kwak, Jin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) : 15793 - 15811
  • [24] Developing smart card-based applications using Java']Java Card
    Vandewalle, JJ
    Vétillard, E
    [J]. SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 105 - 124
  • [25] Enhancing the Security for Smart Card-Based Embedded Systems
    Kalyana Abenanth, G.
    Harish, K.
    Sachin, V.
    Rushyendra, A.
    Mohankumar, N.
    [J]. Lecture Notes on Data Engineering and Communications Technologies, 2022, 75 : 673 - 686
  • [26] A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card
    Li, Xiaowei
    Zhang, Yuqing
    Liu, Xuefeng
    Cao, Jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (05): : 1313 - 1327
  • [27] How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs
    Abe, Yoshiki
    Iwamoto, Mitsugu
    Ohta, Kazuo
    [J]. PROCEEDINGS OF 2020 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2020), 2020, : 377 - 381
  • [28] Smart card-based electronic card payment systems in the transportation industry
    Turban, E
    Brahm, J
    [J]. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2000, 10 (04) : 281 - 293
  • [29] Hide a Liar: Card-Based ZKP Protocol for Usowan
    Robert, Leo
    Miyabara, Daiki
    Lafourcade, Pascal
    Mizuki, Takaaki
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, TAMC 2022, 2022, 13571 : 201 - 217
  • [30] A practical three-party key exchange protocol with round efficiency
    Chang, Ya-Fen
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (04): : 953 - 960