The Scientific World Journal / 2014 / Article / Figbox 2

Research Article

Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks

Box 2

The Exp3 Modification
When asks an Execute or Send query, the simulator answers it exactly as in experiment Exp2,
except that it modifies the way of generating the public Diffie-Hellman values (denoted as and
in the protocol) as follows:
 (i) The simulator chooses two random and computes and .
 (ii) For each instance , the simulator chooses a random , computes
   and uses as the public Diffie-Hellman value (i.e., as or ) of .

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.