Lin C L, Sun H M, and Hwang T. Three party-encrypted keyexchange: attacks and a solution[J].ACM Operating SystemReview.2000, 34(4):12-20[2]Sun H M, Chen B, and Hwang T. Secure key agreementprotocols for three-party against guessing attacks[J].TheJournal of Systems and Software.2005, 75(2):63-68[3]Steiner M, Tsudik G, and Wainder M. Refinement andextension of encrypted key exchange[J].ACM OperationSystems Review.1995, 29(3):22-30[4]Lu R and Cao Z. Simple three-party key exchange protocol[J].Computer Security.2007, 26(1):94-97[5]Guo H, Li Z, and Mu Y, et al.. Cryptanalysis of simple threepartykey exchange protocol[J].Computers Security.2008,27(1):16-21[6]Phan R C, Yau W, and Goi B. Cryptanalysis of simplethree-party key exchange protocol[J].Information Sciences.2008, 178(13):2849-2856[7]Nam J, Paik J, and Kang H, et al.. An off-line dictionaryattack on a simple three-party key exchange protocol[J].IEEE Communications Letters.2009, 13(3):205-208[8]Huang H F. A simple three-party password-based keyexchange protocol[J]. International Journal ofCommunication Systems, 2009, 22(2): 113-119.[9]Canetti R. Universally composable security: a new paradigmfor cryptographic protocols[C]. IEEE Annual Symposium onFoundations of Computer Science, Nevada, USA, October2001: 136-145.[10]Ota H, Yoneyama K, and Kiyomoto S, et al.. Universallycomposable client-to-client general authenticated keyexchange[J]. Transactions of Information Processing Societyof Japan, 2007, 48(9): 3073-3088.[11]Abdalla M, Catalano D, and Chevalier C. Efficient two-partypassword-based key exchange protocols in the UCframework[C]. Cryptographers Track at the RSA Conference2008, San Francisco, USA, April 2008: 335-351.[12]邓淼磊, 王玉磊, 周利华. 通用可组合安全的公平电子支付协议[J].电子与信息学报.2009, 31(5):1063-1066浏览[13]Abdalla M, Fouque P, and Pointcheval D. Password-basedauthenticated key exchange in the three-party setting[J].IEEE Proceedings-Information Security.2006, 153(1):27-39
|