Skip to main content

Enhanced Three-Round Smart Card-Based Key Exchange Protocol

  • Conference paper
Book cover Autonomic and Trusted Computing (ATC 2008)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5060))

Included in the following conference series:

Abstract

In 2007, Kwon et al. proposed a three-round protocol, SKE, for smart card-based key exchange in the three-party setting which provides both key independence and forward secrecy. This paper demonstrates the vulnerability of the SKE protocol and then presents an improvement to repair the security flaws of the SKE protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ding, Y., Horster, P.: Undetectable on-line password guessing attacks. ACM Operating Systems Review 29(4), 77–86 (1995)

    Article  Google Scholar 

  2. Bellare, M., Rogaway, P.: Provably secure session key distribution: The three party case. In: 27th ACM Symposium on the Theory of Computing.STOC 1995, pp. 57–66. ACM Press, New York (1995)

    Chapter  Google Scholar 

  3. Steiner, M., Tsudik, G., Waidner, M.: Refinement and extension of encrypted key exchange. ACM Operating Systems Review 29(3), 22–30 (1995)

    Article  Google Scholar 

  4. Lin, C.L., Sun, H.M., Steiner, M., Hwang, T.: Three-party encrypted key exchange without server public-keys. IEEE Commun. Lett. 5(12), 497–499 (2001)

    Article  Google Scholar 

  5. Chang, C.C., Chang, Y.F.: A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26(5), 471–476 (2004)

    Article  Google Scholar 

  6. Lee, S.W., Kim, H.S., Yoo, K.Y.: Efficient verifier-based key agreement protocol for three parties without server’s public key. Appl. Math. Comput. 167(2), 996–1003 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  7. Sun, H.M., Chen, B.C., Hwang, T.: Secure key agreement protocols for three-party against guessing attacks. Systems and Software 75, 63–68 (2005)

    Article  Google Scholar 

  8. Jaung, W.S.: Efficient three-party key exchange using smart cards. IEEE Trans. Consum. Electron. 50(2), 619–624 (2004)

    Article  Google Scholar 

  9. Kwon, J.O., Jeong, I.R., Lee, D.H.: Three-round smart card-based key exchange scheme. IEICE Trans. Commun. E90-B(11), 3255–3258 (2007)

    Article  Google Scholar 

  10. Abdalla, M., Bellare, M., Rogaway, P.: DHAES: An encryption scheme based on the Diffie-Hellman problem, Submission to IEEE P1363 (1998)

    Google Scholar 

  11. Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumption and an analysis of DHIES, CT-RSA01, pp.143–158 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Chunming Rong Martin Gilje Jaatun Frode Eika Sandnes Laurence T. Yang Jianhua Ma

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoon, EJ., Yoo, KY. (2008). Enhanced Three-Round Smart Card-Based Key Exchange Protocol. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69295-9_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69294-2

  • Online ISBN: 978-3-540-69295-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics