中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 期刊论文
Title:
cryptanalysis of a three-party password-based authenticated key exchange protocol using weil pairing
Author: He Debiao ; Chen Jianhua
Keyword: Computer crime
Source: International Journal of Electronic Security and Digital Forensics
Issued Date: 2012
Volume: 4, Issue:4, Pages:244-251
Indexed Type: EI
Department: (1) School of Mathematics and Statistics Wuhan University Wuhan 430072 China; (2) State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100049 China
Abstract: Recently, Zeng et al. proposed a three-party password-based authenticated key exchange protocol, in which two users could generate a common secret key with the help of the server. Although Zeng et al. claimed that their protocol could withstand various attacks, we point out that their protocol cannot resist impersonation attacks and undetectable online dictionary attacks. The analysis shows Zeng et al.'s protocol is insecure for practical applications. Copyright © 2012 Inderscience Enterprises Ltd. Copyright © 2012 Inderscience Enterprises Ltd.
English Abstract: Recently, Zeng et al. proposed a three-party password-based authenticated key exchange protocol, in which two users could generate a common secret key with the help of the server. Although Zeng et al. claimed that their protocol could withstand various attacks, we point out that their protocol cannot resist impersonation attacks and undetectable online dictionary attacks. The analysis shows Zeng et al.'s protocol is insecure for practical applications. Copyright © 2012 Inderscience Enterprises Ltd. Copyright © 2012 Inderscience Enterprises Ltd.
Language: 英语
Content Type: 期刊论文
URI: http://ir.iscas.ac.cn/handle/311060/15160
Appears in Collections:软件所图书馆_期刊论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
He Debiao,Chen Jianhua. cryptanalysis of a three-party password-based authenticated key exchange protocol using weil pairing[J]. International Journal of Electronic Security and Digital Forensics,2012-01-01,4(4):244-251.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[He Debiao]'s Articles
[Chen Jianhua]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[He Debiao]‘s Articles
[Chen Jianhua]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace