2009
DOI: 10.1016/j.compeleceng.2008.05.007
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced password-based simple three-party key exchange protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
30
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 49 publications
(30 citation statements)
references
References 18 publications
0
30
0
Order By: Relevance
“…By security analysis, Huang claimed that the proposed HS-3PAKE protocol to be not only secure against various attacks, but also more efficient than the previously proposed 3PAKE protocols. However, this paper demonstrates that HS-3PAKE protocol is vulnerable to undetectable online password guessing attacks [9,10,15,16] and off-line password guessing attacks by any other user [11,14].…”
Section: Introductionmentioning
confidence: 94%
“…By security analysis, Huang claimed that the proposed HS-3PAKE protocol to be not only secure against various attacks, but also more efficient than the previously proposed 3PAKE protocols. However, this paper demonstrates that HS-3PAKE protocol is vulnerable to undetectable online password guessing attacks [9,10,15,16] and off-line password guessing attacks by any other user [11,14].…”
Section: Introductionmentioning
confidence: 94%
“…Many of these protocols have never been proven secure in any model [3,13,[17][18][19][20][21] and/or have been found to be vulnerable to some attack(s) [2,3,5,6,8,[18][19][20]23,[26][27][28][29][30][31][32]. Some protocols [2,11,12,15,23,24] have been proven secure only in a restricted model, in which the adversary is not allowed to corrupt protocol participants, and thus, no attacks by malicious clients can be captured.…”
Section: Introductionmentioning
confidence: 99%
“…A number of three-party PAKE protocols have been proposed over the last decade [2,3,5,6,[11][12][13][14][15][16][17][18][19][20][21][22][23][24][25]. Many of these protocols have never been proven secure in any model [3,13,[17][18][19][20][21] and/or have been found to be vulnerable to some attack(s) [2,3,5,6,8,[18][19][20]23,[26][27][28][29][30][31][32].…”
Section: Introductionmentioning
confidence: 99%
“…They claimed that their protocol can resist various attacks and is superior to similar protocols with respect to efficiency. Kim and Choi [13] found that the STPKE protocol is vulnerable to undetectable online password guessing attacks by using formal description and proposed an alternative protocol (STPKE' protocol).…”
Section: Introductionmentioning
confidence: 99%