2005
DOI: 10.1016/j.amc.2004.06.129
|View full text |Cite
|
Sign up to set email alerts
|

Efficient verifier-based key agreement protocol for three parties without server’s public key

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
36
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 55 publications
(36 citation statements)
references
References 8 publications
0
36
0
Order By: Relevance
“…Lee et al 's Scheme. Lee et al [8] proposed a verifier-based authentication scheme without server's public key based on the Diffie-Hellman key exchange. Their scheme enables each client to only remember a memorable password.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Lee et al 's Scheme. Lee et al [8] proposed a verifier-based authentication scheme without server's public key based on the Diffie-Hellman key exchange. Their scheme enables each client to only remember a memorable password.…”
Section: Related Workmentioning
confidence: 99%
“…The remainder of this paper is organized as follows. Section 2 reviews and analyzes verifier-based three-party authentication schemes without server public key including Lee et al 's [8], Wang-Mo's [9], Kwon et al 's [10], and LinLee's [7] schemes. Section 3 introduces notations and security requirements for our scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Recently these two Party key exchange protocols are extended to three party [2,3,7,11,12,13,14,15,16,17,18], in which, the two parties initially communicates the passwords with the trusted server securely. Later the server authenticates the clients when they want to agree upon a session key.…”
Section: Introductionmentioning
confidence: 99%
“…This concept has also been extended to 3 parties, e.g. two clients and a trusted server or key distribution center (KDC) [1], [2], [3], [10], [14], [17], [18], [19], [20], [35], [36], [22].…”
Section: Introductionmentioning
confidence: 99%
“…
two pairing-based three-party password authenticated key exchange protocols.
IN: Third International Conference on Network and System Security, (NSS`09),Gold Coast, QLD,[19][20][21] Additional Information:• This is a conference paper [ c IEEE]. It is also available at:

http://ieeexplore.ieee.org/ Personal use of this material is permitted.

However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

…”
mentioning
confidence: 99%