Enhanced three-round smart card-based key exchange protocol

被引:0
|
作者
Yoon, Eun-Jun [1 ]
Yoo, Kee-Young [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
关键词
cryptography; authentication; password; key exchange; smart card; cryptanalysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In 2007, Kwon et al. proposed a three-round protocol, SKE, for smart card-based key exchange in the three-party setting which provides both key independence and forward secrecy. This paper demonstrates the vulnerability of the SKE protocol and then presents an improvement to repair the security flaws of the SKE protocol.
引用
收藏
页码:507 / 515
页数:9
相关论文
共 50 条
  • [41] Cryptanalysis of a smart card-based remote authentication scheme with anonymity
    School of Computer Science and Technology, Huazhong University of Science and Technology, Hongshan Distract, Wuhan City, Hubei
    430074, China
    [J]. J. Comput. Theor. Nanosci., 11 (4778-4784):
  • [42] Smart card-based irregular access patterns detection system
    Leong, A
    Fong, S
    Siu, S
    [J]. 2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 546 - 553
  • [43] The design of a smart card-based home-help system
    Frisk, A
    Göransson, B
    Sandbäck, T
    Thomasson, V
    [J]. HUMAN-COMPUTER INTERACTION - INTERACT'01, 2001, : 849 - 855
  • [44] ON SECURITY OF A PRACTICAL THREE-PARTY KEY EXCHANGE PROTOCOL WITH ROUND EFfiCIENCY
    Lee, Cheng-Chi
    Chang, Ya-Fen
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2008, 37 (04): : 333 - 335
  • [45] Security Enhancements of Smart Card-Based Remote User Password Authentication Scheme with Session Key Agreement
    An, Young-Hwa
    [J]. 2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 669 - 674
  • [46] Impact of embedding scenarios on the smart card-based fingerprint verification
    Park, Byungkwan
    Moon, Daesung
    Chung, Yongwha
    Park, Jin-Won
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 110 - 120
  • [47] A taxonomy of various attacks on smart card-based applications and countermeasures
    Gupta, B. B.
    Quamara, Megha
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (07):
  • [48] Practical card-based implementations of Yao's millionaire protocol
    Miyahara, Daiki
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 803 : 207 - 221
  • [49] Enhanced password-based simple three-party key exchange protocol
    Kim, Hyun-Seok
    Choi, Jin-Young
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 107 - 114
  • [50] Enhanced Biometric Smart Key Scheme for Smart Card Authentication
    Kokilavani, S.
    Vignesh, M. D.
    Surya, E.
    Narendran, A.
    Prasanalakshmi, B.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,