Three-Round Smart Card-Based Key Exchange Scheme(Fundamental Theories for Communications)
スポンサーリンク
概要
- 論文の詳細を見る
Smart card-based key exchange in the three-party setting allows two users with smart cards to agree on a common session key with the help of the trusted server. In this letter, we propose an efficient three-party smart card-based key exchange scheme with explicit (or mutual) authentication which requires only three rounds. Our scheme is the most round-/communication-efficient smart card-based key exchange scheme among those found in the literature, while providing key independence, forward secrecy and security against denial-of-service (DoS) attacks.
- 社団法人電子情報通信学会の論文
- 2007-11-01
著者
-
Lee Dong
Graduate School of Information Management & Security, CIST, Korea University
-
KWON Jeong
Graduate School of Information Security CIST, Korea university
-
Kwon Jeong
Graduate School Of Information Security Cist Korea University
-
Lee Dong
Etri (electronics And Telecommunications Research Institute)
-
Kwon Jeong
Information Security Group Samsung Sds
-
Lee Dong
Graduate School Of Information & Communication Ajou University
-
JEONG Ik
ETRI (Electronics and Telecommunications Research Institute)
-
Jeong Ik
Graduate School Of Information Management & Security Cist Korea University
関連論文
- RFID tag search protocol preserving privacy of mobile reader holders
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme
- Stronger Chikazawa-Yamagishi ID-Based Key Distribution
- Searchable Encryption with Keyword-Recoverability
- SSR (Smart Sleep Recognizer): Making Decision Based on Probability of User's Intension (日韓合同ワークショップ 1st Korea-Japan Joint Workshop on Ubiquitous Computing and Networking Systems (ubiCNS 2005))
- Change of Rotated Cube Texture through Multi-processing in 3% Si-steels
- Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
- Analysis of Revocable-iff-Linked Ring Signature Scheme
- Strong ID-Based Key Distribution
- Three-Round Smart Card-Based Key Exchange Scheme(Fundamental Theories for Communications)
- On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing(Information Security)
- Ultimate Longitudinal Strength-Based Safety and Reliability Assessment of a Ship′s Hull Girder〔付 討論〕
- Incompletely Condensed Silsesquioxanes : Formation and Reactivity
- A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations
- Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data
- Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages