In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both symmetric and public-key cryptography independent of the public key infrastructure (PKI). In this paper, we first discover that there exist some weaknesses in EKE protocol that is subjected to imposter attacks based on the analysis result of BAN logic that we apply in EKE protocol. In order to remedy the flaws, we propose an improved scheme—Provable Password-Authenticated Key Exchange (PPAKE) protocol that generates the session key’s timestamp, and verifies the authenticity of public key against imposter attack without online trusted third parties. The proposed pro...
. Classical cryptographic protocols based on shared secret keys often are vulnerable to key-guessing...
[[conferencetype]]國際[[conferencedate]]20120326~20120329[[iscallforpapers]]Y[[conferencelocation]]Fuk...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
1 Introduction Classical symmetric key based authenticated key exchange protocols dictate the shared...
[[abstract]]Recently, Zhu et al. proposed an password-based authenticated key exchange protocol base...
[[abstract]]The password-authenticated key exchange (PAKE) is an important tool to secure wireless c...
Abstract. Yeh et al. recently proposed a password-based authenticated key exchange protocol based on...
[[abstract]]Recently, Parks et al. proposed an authentication and key agreement protocol for low-pow...
The key exchange protocol is one of the most elegant ways of establishing secure communication betwe...
Encryption and decryption mechanisms, requiring a public algorithm and a secure key, are a way of ha...
With the advancement in Internet-based technologies, network applications are no longer just limited...
In wireless personal area networks, establishing trust and authentication with previously unknown pa...
In 2002, Zhu et al. proposed a password authenticated key exchange protocol based on RSA such that i...
In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. propos...
Password-authenticated group key exchange protocols enable communication parties to establish a comm...
. Classical cryptographic protocols based on shared secret keys often are vulnerable to key-guessing...
[[conferencetype]]國際[[conferencedate]]20120326~20120329[[iscallforpapers]]Y[[conferencelocation]]Fuk...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
1 Introduction Classical symmetric key based authenticated key exchange protocols dictate the shared...
[[abstract]]Recently, Zhu et al. proposed an password-based authenticated key exchange protocol base...
[[abstract]]The password-authenticated key exchange (PAKE) is an important tool to secure wireless c...
Abstract. Yeh et al. recently proposed a password-based authenticated key exchange protocol based on...
[[abstract]]Recently, Parks et al. proposed an authentication and key agreement protocol for low-pow...
The key exchange protocol is one of the most elegant ways of establishing secure communication betwe...
Encryption and decryption mechanisms, requiring a public algorithm and a secure key, are a way of ha...
With the advancement in Internet-based technologies, network applications are no longer just limited...
In wireless personal area networks, establishing trust and authentication with previously unknown pa...
In 2002, Zhu et al. proposed a password authenticated key exchange protocol based on RSA such that i...
In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. propos...
Password-authenticated group key exchange protocols enable communication parties to establish a comm...
. Classical cryptographic protocols based on shared secret keys often are vulnerable to key-guessing...
[[conferencetype]]國際[[conferencedate]]20120326~20120329[[iscallforpapers]]Y[[conferencelocation]]Fuk...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...