By Topic

A Three-party Encrypted Key Exchange Protocol with Protected Password Authentication

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Hsing-Chung Chen ; Dept. of Comput. Sci. & Inf. Eng., Asia Univ., Taichung, Taiwan ; Hsien-Yun Chuang

In 2008, Yoon and Yoo proposed a password-based 3PEKE scheme, which can improve some secure weaknesses of the password-based 3PEKE scheme. However, in 2009, Lo and Yeh shown that the 3PEKE scheme cannot resist undetectable on-line password guessing attacks and proposed a new approach to solve this problem. Although they actually propose an improved approach, the exchange-message roles are quite different from the traditional 3PEKE schemes in which the key information be exchanged between just one specific client and server. That is, a client will still act as the intermediate role who exchanges the messages flow between the other client and server. In other words, both clients will exchange key information with server, individually. Therefore, we propose an approach, which is called Three-party Encrypted Key Exchange Protocol with Protected Password Authentication (3PEKE-PPA), to improve the traditional password-based 3PEKE scheme. Our scheme can achieve effective implement and resist undetectable on-line password guessing attacks.

Published in:

Frontier Computing. Theory, Technologies and Applications, 2010 IET International Conference on

Date of Conference:

4-6 Aug. 2010