2012
DOI: 10.1016/j.ins.2012.06.005
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
32
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(32 citation statements)
references
References 47 publications
0
32
0
Order By: Relevance
“…It has been observed that the 3PAKE protocol is either based on the smart card [10][11][12][13][14][15] or without smart card [16][17][18][19] and uses many cryptographic algorithms such as one-way hash function [15], ecc [20], chaotic maps [21][22][23][24][25][26] in the literature. In 2006, Juang [11] proposed a 3PAKE protocol using smart card, which was not suitable for practical application, as the response time of the protocol was very low, because of taking five rounds of messages.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It has been observed that the 3PAKE protocol is either based on the smart card [10][11][12][13][14][15] or without smart card [16][17][18][19] and uses many cryptographic algorithms such as one-way hash function [15], ecc [20], chaotic maps [21][22][23][24][25][26] in the literature. In 2006, Juang [11] proposed a 3PAKE protocol using smart card, which was not suitable for practical application, as the response time of the protocol was very low, because of taking five rounds of messages.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, Wu et al . proved that the scheme of Chang et al , is vulnerable to a partition attack and proposed an improvement. Further, in 2013, Tso showed that the scheme of Chang et al , is insecure against passive attacks and then proposed two improvements to withstand the security flaws found in .…”
Section: Introductionmentioning
confidence: 99%
“…In such a three-party model, the server provides its registered clients with a centralized authentication service, which allows each client to remember and manage only a single password. Password guessing attacks (also known as dictionary attacks) present a more subtle threat in the three-party model (compared to a two-party model), as a malicious client can attempt to mount such an attack against another client; see [2][3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…A number of three-party PAKE protocols have been proposed over the last decade [2,3,5,6,[11][12][13][14][15][16][17][18][19][20][21][22][23][24][25]. Many of these protocols have never been proven secure in any model [3,13,[17][18][19][20][21] and/or have been found to be vulnerable to some attack(s) [2,3,5,6,8,[18][19][20]23,[26][27][28][29][30][31][32].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation