The Study of Three-Party Encrypted Key Exchange Protocol with Time Constraint
碩士 === 亞洲大學 === 資訊工程學系碩士班 === 98 === In 2004, Chang et al. proposed a new 3PEKE (three-party encrypted key exchange) scheme which is without using the server's public keys. However, in 2008, both Yoon et al. and Chen et al. showed that Chang et al.’s scheme cannot resist undetectable on-line pa...
Main Authors: | Hsien-Yun Chuang, 莊賢耘 |
---|---|
Other Authors: | Hsing-Chung Chen |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/02822532968333483963 |
Similar Items
-
Two Three-Party Key Distribution Protocols with Authenticated Time Constraint
by: Lin, Syuan-Zong, et al.
Published: (2012) -
Practical Three-Party Key Exchange Protocols
by: Jeng-hung Lo, et al.
Published: (2010) -
An Efficient Three-Party Key Exchange Protocol
by: Wen-Hui Li, et al.
Published: (2009) -
GENERALIZED MATRIXES OF GALOIS PROTOCOLS EXCHANGE ENCRYPTION KEYS
by: Anatoly Beletsky
Published: (2016-03-01) -
On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys
by: Junghyun Nam, et al.
Published: (2014-01-01)