Hu Xiong, Yanan Chen, Zhong Chen, and Fagen Li
[1] W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 22(6), 1976, 644–654. [2] M. Abdalla and D. Pointcheval, Simple password-based encrypted key exchange protocols, Topics in cryptology-CT-RSA 2005, LNCS 3376, Springer-Verlag, 2005, 191–208. [3] S.M. Bellovin and M. Merrit, Encrypted key exchanged: Password-based protocols secure against dictionary attacks, Proceedings of IEEE Symposium on Research in Security and Privacy, 1992, 72–84. [4] L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, An efficient protocol for authenticated key agreement, Designs, Codes and Cryptography, 28(2), 2003, 119–134. [5] Menezes, P.C. Van Oorschot, and S. Vanstone, Handbook of applied cryptography (USA: CRC Press, 1997). [6] T.Y. Chang, W.P. Yang, and M.S. Hwang, Simple authenticated key agreement and protected password change protocol, Computers & Mathematics with Applications, 49(5–6), 2005, 703–714. [7] T.Y. Chang, Y.J. Yang, and C.C. Peng, A personalized rhythm click-based authentication system, Information Management and Computer Security, 18(2), 2010, 72–85. [8] M. Kumar, A new secure remote user authentication scheme with smart cards, International Journal of Network Security, 11(3), 2010, 128–133. [9] T.H. Chen, W.B. Lee, and H.B. Chen, A round-and computation-efficient three party authenticated key exchange protocol, Journal of Systems and Software, 81(9), 2008, 1581–1590. [10] H. Guo, Z. Li, Y. Mu, and Y. Zhang, Cryptanalysis of simple three-party key exchange protocol, Computers & Security, 27(1–2), 2008, 16–21. [11] H.F. Huang, A simple three-party password-based key exchange protocol, International Journal of Communication Systems, 22(7), 2009, 857–862. [12] D.C. Lou and H.F. Huang, Efficient three-party password-based key exchange scheme, International Journal of Communication Systems, 24(4), 2010, 504–512. [13] R. Lu and Z. Cao, Simple three-party key exchange protocol, Computers & Security, 26(1), 2007, 94–97. [14] C. Lv, M. Ma, H. Li, and J.F. Ma, An efficient three-party authenticated key exchange protocol with one-time key, INFOCOM IEEE Conference on Computer Communications Workshops, 2010, 1–5. [15] R.C.-W. Phana, W.C. Yaub, and B.M. Goi, Cryptanalysis of simple three-party key exchange protocol (S-3PAKE), Information Sciences, 178(13), 2008, 2849–2856. [16] Z.W. Tan, An enhanced three-party authentication key exchange protocol for mobile commerce environments, Journal of Communications, 5(5), 2010, 436–443. [17] J.H. Yang and C.C. Chang, An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments, Journal of Systems and Software, 82(9), 2009, 1497–1502. [18] J. Nam, Y. Lee, S. Kim, and D. Won, Security weakness in a three-party pairing-based protocol for password authenticated key exchange, Information Sciences, 177(6), 2007, 1364–1375. [19] M. Abdalla and D. Pointcheval, Interactive Diffie–Hellman assumptions with applications to password-based authentication, FC 2005, LNCS 3570, Springer-Verlag, 2005, 341–356. [20] T.Y. Chang, M.S. Hwang, and W.P. Yang, A communication-efficient three-party password authenticated key exchange protocol, Information Sciences, 181(1), 2011, 217–226. [21] K. Yoneyama, Efficient and strongly secure password-based server aided key exchange, INDOCRYPT 2008, LNCS 5365, Springer-Verlag, 2008, 172–184. Also in Journal of Information Processing, 17, 2009, 202–215. [22] H.A. Wen, T.F. Lee, and T. Hwang, Provably secure three-party password-based authenticated key exchange protocol using weil pairing, IEE Proceedings Communications, 152(2), 2005, 138–143. [23] H.Y. Chien and T.C. Wu, Provably secure password-based three-party key exchange with optimal message steps, The Computer Journal, 52(6), 2009, 646–655. [24] J. Zhao and Gu, Provably secure three-party password-based authenticated key exchange protocol, Information Sciences, 184(1), 2012, 310–323. [25] E.M. Clarke, O. Grumberg, and D.A. Peled, Model checking (Cambridge: MIT Press, 1999). [26] AVISPA v1.1 User Manual, 2006. Available: http://www.avispa-project.org/. [27] A. Cilardo, L. Coppolino, N. Mazzocca, and L. Romano, Elliptic curve cryptography engineering, Proceedings of the IEEE, 94(2), 2006, 395–406. [28] D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, 29(2), 1983, 198–208.
Important Links:
Go Back