Research Article

On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

Table 2

Establishing the secret keys and in our improved protocol.


chooses a random , computes and , and sends to . At the same time, chooses a random , computes and , and sends to . Then, and set . chooses a random , computes and , and sends to . At the same time, chooses a random , computes and , and sends to . Then, and set .