4.5 Article

Secure key agreement protocols for three-party against guessing attacks

Journal

JOURNAL OF SYSTEMS AND SOFTWARE
Volume 75, Issue 1-2, Pages 63-68

Publisher

ELSEVIER SCIENCE INC
DOI: 10.1016/j.jss.2003.11.017

Keywords

cryptography; encrypted key exchange (EKE); three-party EKE; verifier-based; guessing attacks

Ask authors/readers for more resources

Key exchange protocol is important for sending secret messages using the session key between two parties. In order to reach the objective, the premise is to generate a session key securely. Encryption key exchange was first proposed to generate a session key with a weak authenticated password against guessing attacks. Next, another authenticated key exchange protocols for three-party, two clients who request the session key and one server who authenticates the user's identity and assist in generating a session key, were proposed. In this paper, we focus on the three-party authenticated key exchange protocol. In addition to analyzing and improving a password-based authenticated key exchange protocol, a new verified-based protocol is also proposed. (C) 2003 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available