Three-party Encrypted Key Exchange: Attacks and A Solution

@article{Lin2000ThreepartyEK,
  title={Three-party Encrypted Key Exchange: Attacks and A Solution},
  author={Chun-Li Lin and Hung-Min Sun and Tzonelih Hwang},
  journal={Operating Systems Review},
  year={2000},
  volume={34},
  pages={12-20}
}
Password-based mechanism is the widely used method for authentication since it allows people to choose their own passwords without any assistant device to generate or store. However, people are used to choose easy-to-remember passwords such that guessing attacks could succeed. In 1992, Bellovin and Merritt proposed Encrypted Key Exchange (EKE) protocols for preventing guessing attacks, in which two communication parties A and B securely share a possibly weak password in advance. In large… CONTINUE READING
Highly Influential
This paper has highly influenced 13 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 206 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 109 extracted citations

206 Citations

0102030'01'04'08'12'16
Citations per Year
Semantic Scholar estimates that this publication has 206 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-3 of 3 references

Similar Papers

Loading similar papers…