71
Views
0
CrossRef citations to date
0
Altmetric
Articles

ETP-AKEP: enhanced three-party authenticated key exchange protocols for data integrity in cloud environments

&
Pages 126-133 | Received 10 Dec 2021, Accepted 28 Jun 2022, Published online: 07 Jul 2022

References

  • Babu, S. D., & Pamula, R. (2020, April). An effective block-chain based authentication technique for cloud based IoT. In International Conference on Advances in Computing and Data Sciences (pp. 305–319). Springer.
  • Bouchaala, M., Ghazel, C., & Saidane, L. A. (2022). Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card. The Journal of Supercomputing, 78(1), 497–522. https://doi.org/10.1007/s11227-021-03857-7
  • Gajra, N., Khan, S. S., & Rane, P. (2014, August). Private cloud security: Secured user authentication by using enhanced hybrid algorithm. In 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014) (pp. 1–6). IEEE.
  • He, D., Chen, Y., & Chen, J. (2013). An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Arabian Journal for Science and Engineering, 38(8), 2055–2061. https://doi.org/10.1007/s13369-013-0575-4
  • He, D., Kumar, N., Lee, J. H., & Sherratt, R. S. (2014). Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics, 60(1), 30–37. https://doi.org/10.1109/TCE.2014.6780922
  • Islam, S. H., Amin, R., Biswas, G. P., Farash, M. S., Li, X., & Kumari, S. (2017). An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. Journal of King Saud University-Computer and Information Sciences, 29(3), 311–324. https://doi.org/10.1016/j.jksuci.2015.08.002
  • Islam, S. K. (2014). Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dynamics, 78(3), 2261–2276. https://doi.org/10.1007/s11071-014-1584-x
  • Nandakumar, K., Vinod, V., Akbar Batcha, S. M., Sharma, D. K., Elangovan, M., Poonia, A., Mudlappa Basavaraju, S., Dogiwal, S. R., Dadheech, P., & Sengan, S. (2021). Securing data in transit using data-in-transit defender architecture for cloud communication. Soft Computing, 25(18), 12343–12356. https://doi.org/10.1007/s00500-021-05928-6
  • Pu, Q., Zhao, X., & Ding, J. (2009, December). Cryptanalysis of a three-party authenticated key exchange protocol using elliptic curve cryptography. In 2009 International Conference on Research Challenges in Computer Science (pp. 7–10). IEEE.
  • Reddy, Y. V. (2021). Fixing the generalized integrated Diffie-Hellman-DSA key exchange protocol. Annals of the Romanian Society for Cell Biology, 8170–8174.
  • Salvakkam, Dilli Babu, & Pamula, Rajendra. (2022a). Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment. Journal of Intelligent Information Systems. http://dx.doi.org/10.1007/s10844-022-00715-7
  • Salvakkam, Dilli Babu, & Pamula, Rajendra. (2022b). MESSB-LWE: multi-extractable somewhere statistically binding and learning with error-based integrity and authentication for cloud storage. The Journal of Supercomputing, 2021, 334. http://dx.doi.org/10.1007/s11227-022-04497-1
  • Tan, Z. (2010a). An enhanced three-party authentication key exchange protocol for mobile commerce environments. Journal of Communications, 5(5), 436–443.
  • Tan, Z. (2010b). An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography. Journal of Convergence Information Technology, 5(4), 120–129. https://doi.org/10.4156/jcit.vol5.issue4.13
  • Yang, J. H., & Chang, C. C. (2009). An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Journal of Systems and Software, 82(9), 1497–1502. https://doi.org/10.1016/j.jss.2009.03.075

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.