Paper Title:
A Simple Password-Based Authenticated Key Agreement Protocol
  Abstract

The authenticated key agreement protocols are widely used mechanisms for users to negotiate session keys and authenticate each other. Until now, there are many authenticated key agreement protocols proposed. However, many of them suffer from various attacks such as guessing attack, replay attack, impersonate attack, etc. In this paper, we propose a simple password-based authenticated key agreement protocol to solve these problems. The proposed protocol not only provides forward and backward secrecy, but also can resist replay attack, modification attack, and password guessing attack. Moreover, the computation cost of the protocol is very low.

  Info
Periodical
Edited by
Yuhang Yang, Xilong Qu, Yiping Luo and Aimin Yang
Pages
510-513
DOI
10.4028/www.scientific.net/AMR.216.510
Citation
Y. C. Lee, "A Simple Password-Based Authenticated Key Agreement Protocol", Advanced Materials Research, Vol. 216, pp. 510-513, 2011
Online since
March 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Zuo Wen Tan
Abstract:Recently, Chen et al. proposed an efficient three-party encrypted key exchange protocol based upon Schnorr’s digital signature scheme with...
1367
Authors: Young Hwa An
Abstract:In 2008, Bindu et al. proposed an improvement to Chien et al.'s remote password authentication scheme preserving user anonymity, and has...
184
Authors: Ren Junn Hwang, Feng Fu Su, Loang Shing Huang
Chapter 7: Other Related Topics
Abstract:This paper proposes a three-party authenticated key exchange protocol using two-factor including a password and a token. The proposed...
2075
Authors: Hui Liu
Chapter 10: Applied Computing and Information Technologies
Abstract:To access resources from a remote system, the user authentication is a very important security mechanism. Among remote authentication...
2182
Authors: Yung Cheng Lee, Pei Ju Lee
Chapter 10: Computer and Information Technologies
Abstract:Nowadays, we can easily obtain variety of services through network. But due to the open environment, networks are vulnerable to variety of...
963