earticle

논문검색

Constructing a Conversation Key in Three-Party Communications Environment

초록

영어

This article proposes an efficient, less communication rounds, three-party encrypted key
exchange protocol to achieve the authentication requirement. The protocol is provided with
(1) no asymmetric encryption algorithm which is adopted to reduce the costs (such as any
public-key infrastructure); (2) using pre-shared key to prevent adversaries that masquerade
as legal users after guessing attacks; (3) avoiding the variant man-in-the-middle attacks on
Diffie-Hellman based protocols; (4) achieving mutual authentication. With these four
features, the proposed protocol is suitable for being applied for establishing secure channels
between two clients, which are supported with the same trusted server.

목차

Abstract
 1. Introduction
 2. The Review of Sun et al.’s Password Based Protocol
  2.1 Notations
  2.2 The Steps of Sun et al.’s Protocol
  2.3 The Variant Man-in-the-middle Attack
 3. The Proposed Scheme
  3.1 Notations
  3.2 The Steps of Proposed Protocol
 5. Analyses and Comparisons
 5. Conclusions
 6. References

저자정보

  • Chin-Chen Chang Department of Information Engineering and Computer Science Feng Chia University, Taichung 407, Taiwan and Department of Computer Science and Information Engineering National Chung Cheng University, Chiayi 621, Taiwan
  • Yu-Wei Su Department of Computer Science and Information Engineering National Chung Cheng University, Chiayi 621, Taiwan
  • Chia-Yin Lee Department of Computer Science and Information Engineering National Chung Cheng University, Chiayi 621, Taiwan

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.