Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 825072, 11 pages
http://dx.doi.org/10.1155/2014/825072
Research Article

Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model

1Department of Computer Engineering, Konkuk University, 268 Chungwondaero, Chungju, Chungcheongbukdo 380-701, Republic of Korea
2Information Assurance Research Group, Advanced Computing Research Centre, University of South Australia, Mawson Lakes, SA 5095, Australia
3Department of Computer Engineering, Sungkyunkwan University, 2066 Seoburo, Suwon, Gyeonggido 440-746, Republic of Korea

Received 23 January 2014; Accepted 27 February 2014; Published 14 April 2014

Academic Editors: T. Cao, M. Ivanovic, and F. Yu

Copyright © 2014 Junghyun Nam et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [11 citations]

The following is the list of published articles that have cited the current article.

  • Younsung Choi, Junghyun Nam, Donghoon Lee, Jiye Kim, Jaewook Jung, and Dongho Won, “Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics,” The Scientific World Journal, vol. 2014, pp. 1–15, 2014. View at Publisher · View at Google Scholar
  • Junghyun Nam, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik, and Dongho Won, “On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys,” The Scientific World Journal, vol. 2014, pp. 1–7, 2014. View at Publisher · View at Google Scholar
  • Youngsook Lee, and Juryon Paik, “Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services,” The Scientific World Journal, vol. 2014, pp. 1–8, 2014. View at Publisher · View at Google Scholar
  • Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, and Dongho Won, “Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks,” The Scientific World Journal, vol. 2014, pp. 1–15, 2014. View at Publisher · View at Google Scholar
  • Jongho Moon, Younsung Choi, Jaewook Jung, and Dongho Won, “An improvement of robust biometrics-based authentication and key agreement scheme for multi-server environments using smart cards,” PLoS ONE, vol. 10, no. 12, 2015. View at Publisher · View at Google Scholar
  • Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, and Dongho Won, “Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S System,” International Journal of Information and Education Technology, vol. 5, no. 7, pp. 538–542, 2015. View at Publisher · View at Google Scholar
  • Younsung Choi, Junghyun Nam, Youngsook Lee, Seyoun Jung, and Dongho Won, “Cryptanalysis of advanced biometric-based user authentication scheme for wireless sensor networks*,” Lecture Notes in Electrical Engineering, vol. 330, pp. 1367–1375, 2015. View at Publisher · View at Google Scholar
  • Fu-Shan Wei, Jian-Feng Ma, Guang-Song Li, and Chuan-Gui Ma, “Efficient three-party password-based authenticated key exchange protocol in the standard model,” Ruan Jian Xue Bao/Journal of Software, vol. 27, no. 9, pp. 2389–2399, 2016. View at Publisher · View at Google Scholar
  • Jongho Moon, Jiseon Yu, Hyungkyu Yang, and Dongho Won, “Improvement of biometrics and smart cards-based authentication scheme for multi-server environments,” ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016. View at Publisher · View at Google Scholar
  • Choudhury, Kalwar, Goswami, and Bhuyan, “BRC-KEP: A secure biometric and reversible CA based 2-party key exchange protocol,” 2016 9th International Conference on Contemporary Computing, IC3 2016, 2017. View at Publisher · View at Google Scholar
  • Xiao Haiyan, and Wang Lifang, “An Enhanced Smart Card and Biometrics-Based Authentication Scheme in Multi-server Environment,” Complex, Intelligent, and Software Intensive Systems, vol. 772, pp. 770–779, 2018. View at Publisher · View at Google Scholar