Provably secure three party encrypted key exchange scheme with explicit authentication
From MaRDI portal
Recommendations
- Three weaknesses in a simple three-party key exchange protocol
- Enhanced password-based simple three-party key exchange protocol
- Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
- Cryptanalysis of a simple three-party key exchange protocol
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
Cites work
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords
- Advances in Cryptology - CRYPTO 2003
- Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
- EC2C-PAKA: an efficient client-to-client password-authenticated key agreement
- Efficient and dynamic key management for multiple identities in identity-based systems
- New directions in cryptography
- Provably secure three-party password-based authenticated key exchange protocol
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Three weaknesses in a simple three-party key exchange protocol
- Topics in Cryptology – CT-RSA 2005
- Two-server password-only authenticated key exchange
Cited in
(7)- Three weaknesses in a simple three-party key exchange protocol
- Enhanced password-based simple three-party key exchange protocol
- Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange
- Provably secure three-party password-based authenticated key exchange from RLWE
- Communication-efficient three-party protocols for authentication and key agreement
- Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy
- A reduction-based proof for authentication and session key security in three-party Kerberos
This page was built for publication: Provably secure three party encrypted key exchange scheme with explicit authentication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q497145)