4.7 Article

Communication-efficient three-party protocols for authentication and key agreement

Journal

COMPUTERS & MATHEMATICS WITH APPLICATIONS
Volume 58, Issue 4, Pages 641-648

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.camwa.2009.02.039

Keywords

Authentication; Key agreement; EKE; Network communication; Diffie-Hellman

Ask authors/readers for more resources

Encrypted key exchange (EKE) authentication approaches are very important for secure communicating over public networks. In order to solve the security weaknesses three-party EKE, Yeh et al. [H.T. Yeh, H.M. Sun. T. Hwang, Efficient three-party authentication and key agreement protocols resistant to password guessing attacks, Information Science and Engineering 19 (6) (2003) 1059-1070.] proposed two secure and efficient three-party EKE protocols. Based on the protocol developed by Yeh et al., two improved EKE protocols for authentication and key agreement are proposed in this study. The computational costs of the proposed protocols are the same as those of the protocols of Yeh et al. However, the numbers of messages in the communication are fewer than those of the protocols of Yeh et al. Furthermore, the round efficient versions of our proposed protocols are also described. (C) 2009 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available