Security weakness in a three-party pairing-based protocol for password authenticated key exchange
From MaRDI portal
Publication:865906
DOI10.1016/j.ins.2006.09.001zbMath1125.94037OpenAlexW2048985559WikidataQ114666934 ScholiaQ114666934MaRDI QIDQ865906
Junghyun Nam, Seungjoo Kim, Dongho Won, Young-Sook Lee
Publication date: 20 February 2007
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2006.09.001
provable securityWeil pairingman-in-the-middle attackkey exchange protocolpassword-based authentication
Related Items
EC2C-PAKA: an efficient client-to-client password-authenticated key agreement, A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol, Provably secure three-party password-based authenticated key exchange protocol, Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys, Cryptanalysis of simple three-party key exchange protocol (S-3PAKE), Robust biometric-based three-party authenticated key establishment protocols, Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks, Provably secure three party encrypted key exchange scheme with explicit authentication, Hybrid proxy multisignature: a new type multi-party signature, Three weaknesses in a simple three-party key exchange protocol, Development of a new cryptographic construct using palmprint-based fuzzy vault, Secure threshold multi authority attribute based encryption without a central authority, Provably secure and efficient identification and key agreement protocol with user anonymity, A countable and time-bound password-based user authentication scheme for the applications of electronic commerce
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
- A one round protocol for tripartite Diffie-Hellman
- Protocols for authentification and key establishment
- Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
- Identity-based authenticated key agreement protocol based on Weil pairing
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - CRYPTO 2003
- Cryptography and Coding
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Errors in Computational Complexity Proofs for Protocols
- New Approaches to Password Authenticated Key Exchange Based on RSA
- Security in Communication Networks
- Selected Areas in Cryptography
- Topics in Cryptology – CT-RSA 2005
- Public Key Cryptography - PKC 2005
- Financial Cryptography and Data Security