期刊
JOURNAL OF SYSTEMS AND SOFTWARE
卷 75, 期 1-2, 页码 63-68出版社
ELSEVIER SCIENCE INC
DOI: 10.1016/j.jss.2003.11.017
关键词
cryptography; encrypted key exchange (EKE); three-party EKE; verifier-based; guessing attacks
Key exchange protocol is important for sending secret messages using the session key between two parties. In order to reach the objective, the premise is to generate a session key securely. Encryption key exchange was first proposed to generate a session key with a weak authenticated password against guessing attacks. Next, another authenticated key exchange protocols for three-party, two clients who request the session key and one server who authenticates the user's identity and assist in generating a session key, were proposed. In this paper, we focus on the three-party authenticated key exchange protocol. In addition to analyzing and improving a password-based authenticated key exchange protocol, a new verified-based protocol is also proposed. (C) 2003 Elsevier Inc. All rights reserved.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据