2013
DOI: 10.1016/j.ins.2013.02.004
|View full text |Cite
|
Sign up to set email alerts
|

Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 21 publications
0
19
0
Order By: Relevance
“…In this section, we describe our biometric‐based privacy preserving 3PAKA scheme, which involves three parties in the communication: two users A and B , and the server S (shown in Table IV, Section 3.4) as in . Our 3PAKA scheme consists of six phases, namely, initialization phase, registration phase, login phase, authentication and key agreement phase, revocation and re‐registration phase, and password and biometric update phase.…”
Section: Our Proposed Schemementioning
confidence: 99%
See 3 more Smart Citations
“…In this section, we describe our biometric‐based privacy preserving 3PAKA scheme, which involves three parties in the communication: two users A and B , and the server S (shown in Table IV, Section 3.4) as in . Our 3PAKA scheme consists of six phases, namely, initialization phase, registration phase, login phase, authentication and key agreement phase, revocation and re‐registration phase, and password and biometric update phase.…”
Section: Our Proposed Schemementioning
confidence: 99%
“…In this section, we compare the communication and computation overheads, and functionality features of our scheme with the related existing schemes: the schemes of Xiong et al , , Yang et al , , Pu et al , , and Lin et al , .…”
Section: Performance Comparison With Related Existing Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…Many protocols [5][6][7][8][9], as extensions of the EKE protocol, were proposed, and their security was analyzed heuristically. Since then, numerous 3PAKE protocols with rigorous security proof were given out [12][13][14]. Since then, numerous 3PAKE protocols with rigorous security proof were given out [12][13][14].…”
Section: Introductionmentioning
confidence: 99%