Verifier-based password-authenticated key exchange protocol for three-party

The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.An efficient verifier-based protocol for three parties was pro-posed which contains the following characteristics: against dictionary attack...

Full description

Saved in:
Bibliographic Details
Main Authors: LI Wen-min, WEN Qiao-yan, ZHANG Hua
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2008-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74655291/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537575688339456
author LI Wen-min
WEN Qiao-yan
ZHANG Hua
author_facet LI Wen-min
WEN Qiao-yan
ZHANG Hua
author_sort LI Wen-min
collection DOAJ
description The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.An efficient verifier-based protocol for three parties was pro-posed which contains the following characteristics: against dictionary attack and server compromise attack;providing key secrecy and forward secrecy;ensuring no key control;against known-key attack and man in-the-middle attack and re-ceiving four session keys in performing protocol one time.
format Article
id doaj-art-d9a5f3053e15449584469436cfceabdf
institution Kabale University
issn 1000-436X
language zho
publishDate 2008-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-d9a5f3053e15449584469436cfceabdf2025-01-14T08:32:18ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-0114915274655291Verifier-based password-authenticated key exchange protocol for three-partyLI Wen-minWEN Qiao-yanZHANG HuaThe fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.An efficient verifier-based protocol for three parties was pro-posed which contains the following characteristics: against dictionary attack and server compromise attack;providing key secrecy and forward secrecy;ensuring no key control;against known-key attack and man in-the-middle attack and re-ceiving four session keys in performing protocol one time.http://www.joconline.com.cn/zh/article/74655291/password-authenticated key exchangeverifier-baseddictionary attackbilinear pairs
spellingShingle LI Wen-min
WEN Qiao-yan
ZHANG Hua
Verifier-based password-authenticated key exchange protocol for three-party
Tongxin xuebao
password-authenticated key exchange
verifier-based
dictionary attack
bilinear pairs
title Verifier-based password-authenticated key exchange protocol for three-party
title_full Verifier-based password-authenticated key exchange protocol for three-party
title_fullStr Verifier-based password-authenticated key exchange protocol for three-party
title_full_unstemmed Verifier-based password-authenticated key exchange protocol for three-party
title_short Verifier-based password-authenticated key exchange protocol for three-party
title_sort verifier based password authenticated key exchange protocol for three party
topic password-authenticated key exchange
verifier-based
dictionary attack
bilinear pairs
url http://www.joconline.com.cn/zh/article/74655291/
work_keys_str_mv AT liwenmin verifierbasedpasswordauthenticatedkeyexchangeprotocolforthreeparty
AT wenqiaoyan verifierbasedpasswordauthenticatedkeyexchangeprotocolforthreeparty
AT zhanghua verifierbasedpasswordauthenticatedkeyexchangeprotocolforthreeparty