Cryptanalysis of a Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography

被引:9
|
作者
Pu, Qiong [1 ]
Zhao, Xiuying [1 ]
Ding, Jianmin [1 ]
机构
[1] Informat Engn Univ, Dept Elect, Inst Sci, Zhengzhou, Henan, Peoples R China
关键词
unknown key-share attack; three-party authenticated key exchange; elliptic curve cryptography; SECURE; EFFICIENT;
D O I
10.1109/ICRCCS.2009.11
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Quite recently, Yang et al. presented an efficient three-party authenticated key exchange protocol based upon elliptic curve cryptography for mobile-commerce environments. In this paper, we demonstrate that Yang et al's three-party authenticated protocol is potentially vulnerable to an unknown key-share attack. Thereafter, we suggest a countermeasure to resist our described attacks while the merits of the original protocol are left unchanged. On the other hand, through this work, we also highlight that the existence of insider attacks needs to be taken into consideration in the three-party setting.
引用
收藏
页码:7 / 10
页数:4
相关论文
共 50 条
  • [1] An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography
    Tan, Zuowen
    [J]. Journal of Convergence Information Technology, 2010, 5 (04)
  • [2] An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    Yang, Jen-Ho
    Chang, Chin-Chen
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (09) : 1497 - 1502
  • [3] Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (04) : 1329 - 1343
  • [4] Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card
    Ruhul Amin
    G. P. Biswas
    [J]. Arabian Journal for Science and Engineering, 2015, 40 : 3135 - 3149
  • [5] Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card
    Amin, Ruhul
    Biswas, G. P.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2015, 40 (11) : 3135 - 3149
  • [6] An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments
    He, Debiao
    Chen, Yitao
    Chen, Jianhua
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08) : 2055 - 2061
  • [7] An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments
    Debiao He
    Yitao Chen
    Jianhua Chen
    [J]. Arabian Journal for Science and Engineering, 2013, 38 : 2055 - 2061
  • [8] Cryptanalysis of a three-party password-based authenticated key exchange protocol
    [J]. He, D. (hedebiao@163.com), 1600, Femto Technique Co., Ltd. (16):
  • [9] An authenticated key exchange protocol in elliptic curve cryptography
    Reddy, P. Vasudeva
    Padmavathamma, M.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 697 - 705
  • [10] Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
    Wu, Shuhua
    Pu, Qiong
    Wang, Shengbao
    He, Debiao
    [J]. INFORMATION SCIENCES, 2012, 215 : 83 - 96