2007
DOI: 10.1016/j.cose.2006.08.005
|View full text |Cite
|
Sign up to set email alerts
|

Simple three-party key exchange protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
115
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 145 publications
(115 citation statements)
references
References 10 publications
0
115
0
Order By: Relevance
“…In this paper, it is presented that, STPKE' protocol is vulnerable to an undetectable online password guessing attack, if the identity of the client is exposed, and proposes an alternative protocol by modifying STPKE protocol [12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, it is presented that, STPKE' protocol is vulnerable to an undetectable online password guessing attack, if the identity of the client is exposed, and proposes an alternative protocol by modifying STPKE protocol [12].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, Lu and Cao [12] proposed a simple three-party key exchange (STPKE) protocol based on the chosen-basis computational Diffie-Hellman (CCDH) assumption. They claimed that their protocol can resist various attacks and is superior to similar protocols with respect to efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…Recently these two Party key exchange protocols are extended to three party [2,3,7,11,12,13,14,15,16,17,18], in which, the two parties initially communicates the passwords with the trusted server securely. Later the server authenticates the clients when they want to agree upon a session key.…”
Section: Introductionmentioning
confidence: 99%
“…A number of three-party PAKE protocols have been proposed over the last decade [2,3,5,6,[11][12][13][14][15][16][17][18][19][20][21][22][23][24][25]. Many of these protocols have never been proven secure in any model [3,13,[17][18][19][20][21] and/or have been found to be vulnerable to some attack(s) [2,3,5,6,8,[18][19][20]23,[26][27][28][29][30][31][32].…”
Section: Introductionmentioning
confidence: 99%