In:
Key Engineering Materials, Trans Tech Publications, Ltd., Vol. 460-461 ( 2011-1), p. 231-236
Abstract:
The verifier-based key exchange protocol for three parties deals with the authenticated key agreement process between two clients with the help of a trusted server who have to store their verifiers in the server for authentication. Recently, Liu et al. proposed a key exchange protocol for three-party based on verifier authentication and claimed that their protocol could resist many familiar attacks. Unfortunately, we find out that the proposed protocol is insecure against off-line guessing attack and impersonation attack. In this paper, we conduct a detailed analysis on the flaws of Liu et al.’s protocol. In addition, a new protocol is presented with security analysis.
Type of Medium:
Online Resource
ISSN:
1662-9795
DOI:
10.4028/www.scientific.net/KEM.460-461
DOI:
10.4028/www.scientific.net/KEM.460-461.231
Language:
Unknown
Publisher:
Trans Tech Publications, Ltd.
Publication Date:
2011
detail.hit.zdb_id:
2073306-9
Permalink