Title of article
Communication-efficient three-party protocols for authentication and key agreement
Author/Authors
Tian-Fu Lee a، نويسنده , , Jenn-Long Liu b، نويسنده , , Mei-Jiun Sungc، نويسنده , , Shiueng-Bien Yangd، نويسنده , , Chia-Mei Chenb، نويسنده ,
Issue Information
ماهنامه با شماره پیاپی سال 2009
Pages
8
From page
641
To page
648
Abstract
Encrypted key exchange (EKE) authentication approaches are very important for secure
communicating over public networks. In order to solve the security weaknesses three-
party EKE, Yeh et al. [H.T. Yeh, H.M. Sun, T. Hwang, Efficient three-party authentication
and key agreement protocols resistant to password guessing attacks, Information Science
and Engineering 19 (6) (2003) 1059 1070.] proposed two secure and efficient three-party
EKE protocols. Based on the protocol developed by Yeh et al., two improved EKE protocols
for authentication and key agreement are proposed in this study. The computational costs
of the proposed protocols are the same as those of the protocols of Yeh et al. However,
the numbers of messages in the communication are fewer than those of the protocols
of Yeh et al. Furthermore, the round efficient versions of our proposed protocols are also
described.
Keywords
Network communication , Authentication , EKE , Key agreement , Diffie–Hellman
Journal title
Computers and Mathematics with Applications
Serial Year
2009
Journal title
Computers and Mathematics with Applications
Record number
921983
Link To Document