Abstract | ||
---|---|---|
Password-based mechanism is the widely used method for user authentication. Many password-based authenticated key exchange protocols have been proposed to resist password guessing attacks. In this paper, we present a simple authenticated key agreement protocol called SAKA which is simple and cost-effective. To examine its security, we provide a formal proof of security to show its strength against both passive and active adversaries. Compared with the previously best protocols, SAKA has less number of steps and less computation cost. |
Year | DOI | Venue |
---|---|---|
2002 | 10.1145/583800.583802 | Operating Systems Review |
Keywords | Field | DocType |
formal proof,protocol resistant,provable security,password-based mechanism,password-based authenticated key exchange,computation cost,simple authenticated key agreement,best protocol,password authentication,cryptography,user authentication,key agreement,key exchange,active adversary,cost effectiveness,theorem proving,set theory,network protocols,mathematical models,it security,functions | Zero-knowledge password proof,Password strength,Computer science,Computer security,Authenticated Key Exchange,S/KEY,One-time password,Password,Cognitive password,Encrypted key exchange | Journal |
Volume | Issue | Citations |
36 | 4 | 13 |
PageRank | References | Authors |
1.02 | 21 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Her-Tyan Yeh | 1 | 78 | 7.63 |
Hung-min Sun | 2 | 1343 | 97.06 |