dc.creatorSimplicio, Marcos A., Jr.
dc.creatorSakuragui, Rony R. M.
dc.date.accessioned2013-10-14T11:47:00Z
dc.date.accessioned2018-07-04T16:18:33Z
dc.date.available2013-10-14T11:47:00Z
dc.date.available2018-07-04T16:18:33Z
dc.date.created2013-10-14T11:47:00Z
dc.date.issued2012
dc.identifierINTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, HOBOKEN, v. 25, n. 11, supl. 1, Part 2, pp. 1443-1449, NOV, 2012
dc.identifier1074-5351
dc.identifierhttp://www.producao.usp.br/handle/BDPI/34324
dc.identifier10.1002/dac.1373
dc.identifierhttp://dx.doi.org/10.1002/dac.1373
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/1634193
dc.description.abstractThree-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang proposed a simple 3PAKE protocol based on elliptic curve cryptography, which is claimed to be secure and to provide superior efficiency when compared with similar-purpose solutions. In this paper, however, we show that the solution is vulnerable to key-compromise impersonation and offline password guessing attacks from system insiders or outsiders, which indicates that the empirical approach used to evaluate the scheme's security is flawed. These results highlight the need of employing provable security approaches when designing and analyzing PAKE schemes. Copyright (c) 2011 John Wiley & Sons, Ltd.
dc.languageeng
dc.publisherWILEY-BLACKWELL
dc.publisherHOBOKEN
dc.relationINTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
dc.rightsCopyright WILEY-BLACKWELL
dc.rightsclosedAccess
dc.subjectCRYPTANALYSIS
dc.subjectPASSWORD-AUTHENTICATED KEY EXCHANGE
dc.subjectTHREE-PARTY
dc.subjectOFFLINE PASSWORD GUESSING
dc.subjectKEY-COMPROMISE IMPERSONATION
dc.titleCryptanalysis of an efficient three-party password-based key exchange scheme
dc.typeArtículos de revistas


Este ítem pertenece a la siguiente institución