Paper Title:
A Note on an Enhanced Three-Party Authentication Key Exchange Protocol
  Abstract

Recently, Chen et al. proposed an efficient three-party encrypted key exchange protocol based upon Schnorr’s digital signature scheme with fewer rounds. However, J.H. Yang and C. C. Chang showed that Chen et al.’s protocol still has the high computation cost and communication cost. Moreover, Chen et al.’s protocol suffers from stolen-verifier attacks. Then J.H. Yang and C. C. Chang proposed a three-party authenticated key exchange protocol without password by using elliptic curve cryptography. Their improved protocol requires smaller transmitted message size and less communication times, which is well suitable for resource-limited environments such as mobile communication and mobile commerce. Unfortunately, we find that Yang et al.’s protocol is vulnerable to replay attacks, denial-of-Service attacks and impersonation attacks.

  Info
Periodical
Key Engineering Materials (Volumes 439-440)
Edited by
Yanwen Wu
Pages
1367-1372
DOI
10.4028/www.scientific.net/KEM.439-440.1367
Citation
Z. W. Tan, "A Note on an Enhanced Three-Party Authentication Key Exchange Protocol", Key Engineering Materials, Vols. 439-440, pp. 1367-1372, 2010
Online since
June 2010
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Yung Cheng Lee
Abstract:The authenticated key agreement protocols are widely used mechanisms for users to negotiate session keys and authenticate each other. Until...
510
Authors: Lin Tang, En Jian Bai, Wen Qiang Wu
Chapter 8: Nanomaterials and Nanomanufacturing
Abstract:With the development of e-business market, radio frequency identification (RFID) technology is becoming more and more importance. It is often...
1845
Authors: Ren Junn Hwang, Feng Fu Su, Loang Shing Huang
Chapter 7: Other Related Topics
Abstract:This paper proposes a three-party authenticated key exchange protocol using two-factor including a password and a token. The proposed...
2075
Authors: Miao Lei Deng, Hao Jun Zhang, Wei Jun Zhu
Chapter 18: Communication Technology and Network Security
Abstract:Radio frequency identification (RFID) systems need security protocols to provide confidentiality, user privacy, mutual authentication and...
2331
Authors: Hui Liu
Chapter 10: Applied Computing and Information Technologies
Abstract:To access resources from a remote system, the user authentication is a very important security mechanism. Among remote authentication...
2182