[1]Bellovin S M,Merritt M.Encrypted key exchange:Passwordbased protocols secure against dictionary attacks[C]∥Proc of the 1992 IEEE Symposium on Research in Security and Privacy,1992:7284.
[2]Abdalla M,Chevassut O,Fouque P A,et al.A simple threshold authenticated key exchange from short secrets[C]∥Proc of Asiacrypt’05, 2005:566584.
[3]Kwon J O, Jeong I R, Sakurai K, et al. Efficient verifierbased passwordauthenticated key exchange in the threeparty setting[J]. Computer Standards and Interfaces, 2007,29(5):513520.
[4]Lu R X, Cao Z F . Simple threeparty key exchange protocol[J]. Computer Security, 2007,26(1):9497.
[5]Chung H R, Ku W C. Three weaknesses in a simple threeparty key exchange protocol [J]. Information Science, 2008,178(1):220229.
[6]Kim H S, Choi J Y. Enhanced passwordbased simple threeparty key exchange protocol[J] . Computer Electrical Engineering, 2009,35(1):107114.
[7]Hu Xuexian, Liu Wenfen. Cryptanalysis of two threeparty passwordbased authentication key exchange protocols[J]. Journal of Information Engineering University,2010,11(1):104128.(in Chinese)
[8]Liu X M, Zhou F C, Chang G R. Improved key exchange protocol for threeparty based on verifier authentication[J].Journal of Southeast University(English Edition), 2008, 24(3): 322324.
[9]Wen Tang.A simple three party password based key exchange protocol[C]∥Proc of International Conference on Mechanical and Electrical Technology (ICMET’10), 2010:730732.
[10]Lv Chao,Ma Maode,Li Hui, et al. An efficient threeparty authenticated key exchange protocol with onetime key[C]∥Proc of INFOCOM IEEE Conference on Computer Communications Workshops, 2010:15.
[11]Zhang Zijian, Zhang Qijian. Verifierbased password authenticated key exchange protocol via elliptic curve[C]∥Proc of International Conference on Information Theory and Information Security (ICITIS’10),2010:407410.
[12]Yi Tong, Chen Hongchao, Wu Dailin. Two passwordauthenticated key exchange protocol for three:Safety analysis and improvement[J]. Computer Engineering and Design,2012,33(12):44824486.(in Chinese)
附中文参考文献:
[7]胡学先,刘文芬.对两个三方口令认证密钥交换协议的分析[J].信息工程大学学报,2010,11(1):104128.
[12]易通,陈宏朝,吴戴林.两个三方密钥交换协议的安全性分析与改进[J].计算机工程与设计,2012,33(12):44824486. |