Efficient three‐party encrypted key exchange using trapdoor functions. Issue 11 (28th February 2013)
- Record Type:
- Journal Article
- Title:
- Efficient three‐party encrypted key exchange using trapdoor functions. Issue 11 (28th February 2013)
- Main Title:
- Efficient three‐party encrypted key exchange using trapdoor functions
- Authors:
- Lee, Tian‐Fu
Chang, I‐Pin
Wang, Ching‐Cheng - Abstract:
- ABSTRACT: Three‐party encrypted key exchange (3PEKE) enables two communicating parties to securely exchange confidential and authenticated information over an insecure network via a trusted server. This investigation presents a novel efficient and secure 3PEKE protocol using a super‐poly‐to‐one trapdoor function. The proposed protocol employs the Diffie–Hellman key exchange and adopts the technique that the clients can publicly exchange the factors for generating the session key without the help of the server to reduce the numbers of transmissions. A round‐efficient version of the proposed 3PEKE protocol is also described. Compared with related approaches, the proposed protocol not only retains security requirements and possesses lower computational cost but also has fewer transmissions and realizes the lower bounds of communications. Copyright © 2013 John Wiley & Sons, Ltd. Abstract : This investigation presents a novel efficient and secure three‐party encrypted key exchange protocol using trapdoor functions and its round‐efficient version. The proposed protocol employs the Diffie‐Hellman encrypted key exchange and adopts the technique that the clients can publicly exchange the factors for generating the session key without the help of the server to reduce the numbers of transmissions. Compared with related approaches, the proposed protocol retains security requirements, possesses lower computational cost, and has fewer transmissions.
- Is Part Of:
- Security and communication networks. Volume 6:Issue 11(2013:Nov.)
- Journal:
- Security and communication networks
- Issue:
- Volume 6:Issue 11(2013:Nov.)
- Issue Display:
- Volume 6, Issue 11 (2013)
- Year:
- 2013
- Volume:
- 6
- Issue:
- 11
- Issue Sort Value:
- 2013-0006-0011-0000
- Page Start:
- 1353
- Page End:
- 1358
- Publication Date:
- 2013-02-28
- Subjects:
- network communications -- network protocols -- authentication -- password -- network security
Computer networks -- Security measures -- Periodicals
Computer security -- Periodicals
Cryptography -- Periodicals
005.805 - Journal URLs:
- http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122 ↗
https://www.hindawi.com/journals/scn/ ↗
http://onlinelibrary.wiley.com/ ↗ - DOI:
- 10.1002/sec.717 ↗
- Languages:
- English
- ISSNs:
- 1939-0114
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD Digital store
- Ingest File:
- 1848.xml