Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Efficient three-party key exchange protocols with round efficiency

Full metadata record
DC Field Value Language
dc.contributor.authorYoun, Taek-Young-
dc.contributor.authorKang, Eun Sook-
dc.contributor.authorLee, Changhoon-
dc.date.accessioned2021-09-06T04:49:58Z-
dc.date.available2021-09-06T04:49:58Z-
dc.date.created2021-06-14-
dc.date.issued2013-02-
dc.identifier.issn1018-4864-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/104103-
dc.description.abstractRecently, Guo et al. discovered some security flaws of the simple three-party key exchange protocol proposed by Lu and Cao, and proposed an improved protocol. Independently, Chung and Ku also showed some weaknesses of Lu and Cao's protocol, and provided an improved protocol. In this paper, we review some insecurity of Lu and Cao's protocol and analyze two improved protocols proposed by Guo et al. and Chung and Ku. Then we show that the protocols are still insecure. They are vulnerable to an adversary who performs an off-line password guessing attack. We provide a countermeasure by performing detailed analysis on the security flaws in two improved protocols. We also propose a secure three-party password-authenticated key exchange protocol which requires three rounds.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.titleEfficient three-party key exchange protocols with round efficiency-
dc.typeArticle-
dc.contributor.affiliatedAuthorKang, Eun Sook-
dc.identifier.doi10.1007/s11235-011-9649-3-
dc.identifier.scopusid2-s2.0-84879602205-
dc.identifier.wosid000320781900087-
dc.identifier.bibliographicCitationTELECOMMUNICATION SYSTEMS, v.52, no.2, pp.1367 - 1376-
dc.relation.isPartOfTELECOMMUNICATION SYSTEMS-
dc.citation.titleTELECOMMUNICATION SYSTEMS-
dc.citation.volume52-
dc.citation.number2-
dc.citation.startPage1367-
dc.citation.endPage1376-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorCryptanalysis-
dc.subject.keywordAuthorPassword-
dc.subject.keywordAuthorKey exchange-
dc.subject.keywordAuthorThree-party setting-
dc.subject.keywordAuthorPassword guessing attack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of AI Cyber Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE