Learn More
Password-based mechanism is the widely used method for authentication since it allows people to choose their own passwords without any assistant device to generate or store. However, people are used to choose easy-to-remember passwords such that guessing attacks could succeed. In 1992, Bellovin and Merritt proposed <i>Encrypted Key Exchange</i> (EKE)(More)
In an internet environment, such as UNIX, a remote user has to obtain the access right from a server before doing any job. The procedure of obtaining acess right is called a user authen-tication protocol. User authentication via user memorable password provides convenience without needing any auxiliary devices, such as smart card. A user authentication(More)
— Three-party key-exchange protocols with password authentication — clients share an easy-to-remember password with a trusted server only — are very suitable for applications requiring secure communications between many lightweight clients (end users); it is simply impractical that every two clients share a common secret. In 1995, Steiner, Tsudik and(More)