The Study of Three-Party Encrypted Key Exchange Protocol with Time Constraint

碩士 === 亞洲大學 === 資訊工程學系碩士班 === 98 === In 2004, Chang et al. proposed a new 3PEKE (three-party encrypted key exchange) scheme which is without using the server's public keys. However, in 2008, both Yoon et al. and Chen et al. showed that Chang et al.’s scheme cannot resist undetectable on-line pa...

Full description

Bibliographic Details
Main Authors: Hsien-Yun Chuang, 莊賢耘
Other Authors: Hsing-Chung Chen
Format: Others
Language:en_US
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/02822532968333483963
id ndltd-TW-098THMU8396027
record_format oai_dc
spelling ndltd-TW-098THMU83960272015-11-02T04:04:18Z http://ndltd.ncl.edu.tw/handle/02822532968333483963 The Study of Three-Party Encrypted Key Exchange Protocol with Time Constraint 具時間限制的三方加密金鑰交換協議之研究 Hsien-Yun Chuang 莊賢耘 碩士 亞洲大學 資訊工程學系碩士班 98 In 2004, Chang et al. proposed a new 3PEKE (three-party encrypted key exchange) scheme which is without using the server's public keys. However, in 2008, both Yoon et al. and Chen et al. showed that Chang et al.’s scheme cannot resist undetectable on-line password guessing attacks. And then, Yoon et al. and Chen et al. respectively proposed a new approach to solve Chang et al.'s problem of security. But in 2009, Lo et al. proved that both Yoon et al. and Chen et al. cannot effectively prevent undetectable on-line password guessing attacks and then proposed an improved approach. Although they actually propose an improved approach, the clients who act as the roles of exchange-message are quite different from the traditional 3PEKE schemes. That is, a client will still act as the intermediate role who exchanges the messages between the other one and server. In other words, both clients will exchange messages with server, individually. Thus, we propose three approaches, which are called a 3PEKE Protocol with Protected Password Authentication (3PEKE-PPA), an Enhanced 3PEKE Protocol Using Digital Time-Stamp (3PEKE-DTS) and an Enhanced 3PEKE Protocol with Time Bound (3PEKE-TB), to improve the traditional 3PEKE schemes. Our scheme can achieve effectively implement and resist undetectable on-line password guessing attacks and strengthen the 3PEKE system of security. Hsing-Chung Chen 陳興忠 2010 學位論文 ; thesis 70 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 亞洲大學 === 資訊工程學系碩士班 === 98 === In 2004, Chang et al. proposed a new 3PEKE (three-party encrypted key exchange) scheme which is without using the server's public keys. However, in 2008, both Yoon et al. and Chen et al. showed that Chang et al.’s scheme cannot resist undetectable on-line password guessing attacks. And then, Yoon et al. and Chen et al. respectively proposed a new approach to solve Chang et al.'s problem of security. But in 2009, Lo et al. proved that both Yoon et al. and Chen et al. cannot effectively prevent undetectable on-line password guessing attacks and then proposed an improved approach. Although they actually propose an improved approach, the clients who act as the roles of exchange-message are quite different from the traditional 3PEKE schemes. That is, a client will still act as the intermediate role who exchanges the messages between the other one and server. In other words, both clients will exchange messages with server, individually. Thus, we propose three approaches, which are called a 3PEKE Protocol with Protected Password Authentication (3PEKE-PPA), an Enhanced 3PEKE Protocol Using Digital Time-Stamp (3PEKE-DTS) and an Enhanced 3PEKE Protocol with Time Bound (3PEKE-TB), to improve the traditional 3PEKE schemes. Our scheme can achieve effectively implement and resist undetectable on-line password guessing attacks and strengthen the 3PEKE system of security.
author2 Hsing-Chung Chen
author_facet Hsing-Chung Chen
Hsien-Yun Chuang
莊賢耘
author Hsien-Yun Chuang
莊賢耘
spellingShingle Hsien-Yun Chuang
莊賢耘
The Study of Three-Party Encrypted Key Exchange Protocol with Time Constraint
author_sort Hsien-Yun Chuang
title The Study of Three-Party Encrypted Key Exchange Protocol with Time Constraint
title_short The Study of Three-Party Encrypted Key Exchange Protocol with Time Constraint
title_full The Study of Three-Party Encrypted Key Exchange Protocol with Time Constraint
title_fullStr The Study of Three-Party Encrypted Key Exchange Protocol with Time Constraint
title_full_unstemmed The Study of Three-Party Encrypted Key Exchange Protocol with Time Constraint
title_sort study of three-party encrypted key exchange protocol with time constraint
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/02822532968333483963
work_keys_str_mv AT hsienyunchuang thestudyofthreepartyencryptedkeyexchangeprotocolwithtimeconstraint
AT zhuāngxiányún thestudyofthreepartyencryptedkeyexchangeprotocolwithtimeconstraint
AT hsienyunchuang jùshíjiānxiànzhìdesānfāngjiāmìjīnyàojiāohuànxiéyìzhīyánjiū
AT zhuāngxiányún jùshíjiānxiànzhìdesānfāngjiāmìjīnyàojiāohuànxiéyìzhīyánjiū
AT hsienyunchuang studyofthreepartyencryptedkeyexchangeprotocolwithtimeconstraint
AT zhuāngxiányún studyofthreepartyencryptedkeyexchangeprotocolwithtimeconstraint
_version_ 1718120387039985664