Verifier-based password-authenticated key exchange protocol for three-party
The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.An efficient verifier-based protocol for three parties was pro-posed which contains the following characteristics: against dictionary attack...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2008-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74655291/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537575688339456 |
---|---|
author | LI Wen-min WEN Qiao-yan ZHANG Hua |
author_facet | LI Wen-min WEN Qiao-yan ZHANG Hua |
author_sort | LI Wen-min |
collection | DOAJ |
description | The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.An efficient verifier-based protocol for three parties was pro-posed which contains the following characteristics: against dictionary attack and server compromise attack;providing key secrecy and forward secrecy;ensuring no key control;against known-key attack and man in-the-middle attack and re-ceiving four session keys in performing protocol one time. |
format | Article |
id | doaj-art-d9a5f3053e15449584469436cfceabdf |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2008-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-d9a5f3053e15449584469436cfceabdf2025-01-14T08:32:18ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-0114915274655291Verifier-based password-authenticated key exchange protocol for three-partyLI Wen-minWEN Qiao-yanZHANG HuaThe fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.An efficient verifier-based protocol for three parties was pro-posed which contains the following characteristics: against dictionary attack and server compromise attack;providing key secrecy and forward secrecy;ensuring no key control;against known-key attack and man in-the-middle attack and re-ceiving four session keys in performing protocol one time.http://www.joconline.com.cn/zh/article/74655291/password-authenticated key exchangeverifier-baseddictionary attackbilinear pairs |
spellingShingle | LI Wen-min WEN Qiao-yan ZHANG Hua Verifier-based password-authenticated key exchange protocol for three-party Tongxin xuebao password-authenticated key exchange verifier-based dictionary attack bilinear pairs |
title | Verifier-based password-authenticated key exchange protocol for three-party |
title_full | Verifier-based password-authenticated key exchange protocol for three-party |
title_fullStr | Verifier-based password-authenticated key exchange protocol for three-party |
title_full_unstemmed | Verifier-based password-authenticated key exchange protocol for three-party |
title_short | Verifier-based password-authenticated key exchange protocol for three-party |
title_sort | verifier based password authenticated key exchange protocol for three party |
topic | password-authenticated key exchange verifier-based dictionary attack bilinear pairs |
url | http://www.joconline.com.cn/zh/article/74655291/ |
work_keys_str_mv | AT liwenmin verifierbasedpasswordauthenticatedkeyexchangeprotocolforthreeparty AT wenqiaoyan verifierbasedpasswordauthenticatedkeyexchangeprotocolforthreeparty AT zhanghua verifierbasedpasswordauthenticatedkeyexchangeprotocolforthreeparty |