Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 479534, 7 pages
http://dx.doi.org/10.1155/2014/479534
Research Article

On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

1Department of Computer Engineering, Konkuk University, 268 Chungwondaero, Chungju, Chungcheongbuk-do 380-701, Republic of Korea
2Information Assurance Research Group, Advanced Computing Research Centre, University of South Australia, Mawson Lakes, SA 5095, Australia
3Department of Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Suwon, Gyeonggi-do 440-746, Republic of Korea

Received 19 June 2014; Accepted 16 July 2014; Published 1 September 2014

Academic Editor: Moonseong Kim

Copyright © 2014 Junghyun Nam et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Abdalla, P. Fouque, and D. Pointcheval, “Password-based authenticated key exchange in the three-party setting,” in Public Key Cryptography-PKC 2005, vol. 3386 of Lecture Notes in Computer Science, pp. 65–84, Springer, Berlin, Germany, 2005. View at Google Scholar
  2. J. Nam, Y. Lee, S. Kim, and D. Won, “Security weakness in a three-party pairing-based protocol for password authenticated key exchange,” Information Sciences, vol. 177, no. 6, pp. 1364–1375, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  3. J. Nam, J. Paik, H. Kang, U. M. Kim, and D. Won, “An off-line dictionary attack on a simple three-party key exchange protocol,” IEEE Communications Letters, vol. 13, no. 3, pp. 205–207, 2009. View at Publisher · View at Google Scholar · View at Scopus
  4. T. Lee and T. Hwang, “Simple password-based three-party authenticated key exchange without server public keys,” Information Sciences, vol. 180, no. 9, pp. 1702–1714, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  5. T. Chang, M. Hwang, and W. Yang, “A communication-efficient three-party password authenticated key exchange protocol,” Information Sciences, vol. 181, no. 1, pp. 217–226, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. J. Zhao and D. Gu, “Provably secure three-party password-based authenticated key exchange protocol,” Information Sciences, vol. 184, pp. 310–323, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. S. Wu, Q. Pu, S. Wang, and D. He, “Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol,” Information Sciences, vol. 215, pp. 83–96, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. C. Lee, S. Chen, and C. Chen, “A computation-efficient three-party encrypted key exchange protocol,” Applied Mathematics & Information Sciences, vol. 6, no. 3, pp. 573–579, 2012. View at Google Scholar · View at Scopus
  9. S. Wu, K. Chen, Q. Pu, and Y. Zhu, “Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme,” International Journal of Communication Systems, vol. 26, no. 5, pp. 674–686, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Nam, K. K. R. Choo, M. Kim, J. Paik, and D. Won, “Dictionary attacks against password-based authenticated three-party key exchange protocols,” KSII Transactions on Internet and Information Systems, vol. 7, no. 12, pp. 3244–3260, 2013. View at Google Scholar
  11. J. Nam, K. K. R. Choo, J. Kim et al., “Password-only authenticated three-party key exchange with provable security in the standard model,” The Scientific World Journal, vol. 2014, Article ID 825072, 11 pages, 2014. View at Publisher · View at Google Scholar
  12. M. Bellare and P. Rogaway, “Entity authentication and key distribution,” in Advances in Cryptology—(CRYPTO '93), vol. 773 of Lecture Notes in Computer Science, pp. 232–249, Springer, Berlin, Germany, 1994. View at Publisher · View at Google Scholar · View at MathSciNet
  13. M. Bellare, D. Pointcheval, and P. Rogaway, “Authenticated key exchange secure against dictionary attacks,” in Advances in Cryptology—EUROCRYPT 2000, vol. 1807 of Lecture Notes in Computer Science, pp. 139–155, Springer, Berlin, Germany, 2000. View at Google Scholar
  14. M. Abdalla and D. Pointcheval, “Simple password-based encrypted key exchange protocols,” in Topics in Cryptology—CT-RSA 2005, vol. 3376 of Lecture Notes in Computer Science, pp. 191–208, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar · View at MathSciNet