231
Views
9
CrossRef citations to date
0
Altmetric
Articles

An Efficient 3D Elliptic Curve Diffie–Hellman (ECDH) Based Two-Server Password-Only Authenticated Key Exchange Protocol with Provable Security

, &

REFERENCES

  • J. Choate. 1976. “Tetrahedral treats,” Available: http://www.zebragraph.com/Geometers_Corner_files/tetrahedral%20treats.pdf.
  • J. D'Aurizio. 2008. Available: http://www.cut-the-knot.org/triangle/O-H-I.shtml.
  • M. M. Steven, and M. Bellovin, “Encrypted key exchange: Password-based protocols secure against dictionary attacks,” in Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, 1992, pp. 72–84.
  • C. Lin, H. Sun, and T. Hwang, “Three-party encrypted key exchange: Attacks and a solution,” ACM Oper. Syst. Rev., Vol. 34( no. 4), pp. 12–20, Oct. 2000.
  • Y. Ding, and P. Horster, “Undetectable on-line password guessing attacks,” ACM Oper. Syst. Rev., Vol. 29(4), pp. 77–86, July 1995.
  • Z. Wan, R. H. Deng, F. Bao, and B. Preneel, “nPAKE+: A hierarchical group password-authenticated key exchange protocol using different passwords,” in Proceedings of the 9th International Conference on Information and Communications Security, Zhengzhou, China, 2007, pp. 31–43.
  • H. Chien, T. Wu, and M. Yeh, “Provably secure gateway-oriented password-based authenticated key exchange protocol resistant to password guessing attacks,” J. Inf. Sci. Eng., Vol. 29(2), pp. 249–65, Jan. 2013.
  • J. W. Byun, D. H. Lee, and J. I. Lim, “Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol,” IEEE Commun. Lett., Vol. 10(9), pp. 683–85, Sept. 2006.
  • P. Mackenzie, T. Shrimpton, and M. Jakobsson, “Threshold password-authenticated key (extended abstract),” Lecture Notes Comput. Sci., Vol. 2442, pp. 385–400, Aug. 2002.
  • Y. Yang, R. H. Deng, and F. Bao, “A practical password-based two-server authentication and key exchange system,” IEEE Trans. Dependable Secur. Comput., Vol. 3(2), pp. 105–14, Apr. 2006.
  • J. H. Lee and D. H. Lee, “Secure and efficient password-based authenticated key exchange protocol for two-server architecture,” in Proceedings of the International Conference on Convergence Information Technology, Washington, DC, 2007, pp. 2102–7.
  • D. Yang and B. Yang, “A novel two-server password authentication scheme with provable security,” in Proceedings of the IEEE 10th International Conference on Computer and Information Technology, Bradford, 2010, pp. 1605–9.
  • A. Chouksey and Y. Pandey, “An efficient password based two-server authentication and pre-shared key exchange system using smart cards,” Int. J. Comp. Sci. Inform. Technol., Vol. 4(1), pp. 117–20, Feb. 2013.
  • S. K. Sood, “Dynamic identity based authentication protocol for two-server architecture,” J. Inform. Secur., Vol. 3, pp. 326–34, Oct. 2012.
  • J. Katz, P. Mackenzie, G. Taban, and V. Gligor, “Two-server password-only authenticated key exchange,” Lecture Notes Comp. Sci., Vol. 3531, pp. 1–16, Jun. 2005.
  • X. Yi, S. Ling, and H. Wang, “Efficient two-server password-only authenticated key exchange,” IEEE Trans. Parallel Distribut. Syst., Vol. 24(9), pp. 1773–82, Sept. 2013.
  • H. Jin, D. S. Wong, and Y. Xu, “An efficient password-only two-server authenticated key exchange system,” Lecture Notes Comp. Sci., Vol. 4861, pp. 44–56, Dec. 2007.
  • AVISPA. Available: http://www.avispa-project.org/web-interface/expert.php.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.