Citation: | ZHANG Gefei, FAN Dan, ZHANG Yuqing, et al., “A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password,” Chinese Journal of Electronics, vol. 26, no. 2, pp. 271-278, 2017, doi: 10.1049/cje.2016.06.017 |
W. Diffie and M. Hellman, "New directions in cryptography", IEEE Transactions on Information Theory, Vol.22, No.6, pp.644-654, 1976.
|
L. Law, A. Menezes, M. Qu, et al., "An efficient protocol for authenticated key agreement", Designs, Codes and Cryptography, Vol.28, No.2, pp.119-134, 2003.
|
R. Gennaro, H. Krawczyk, T. Rabin, et al., "Revisited:Fully authenticated diffie-hellman with minimal overhead", Proceedings of Applied Cryptography and Network Security, Beijing, China, pp.309-328, 2010.
|
J.G. Li, Z.W. Wang and Y.C. Zhang, "Provably secure certificate-based signature scheme without pairings", Information Sciences, Vol.233, No.6, pp.313-320, 2013.
|
C.J. Wang, "A provable secure fuzzy identity based signature scheme", Science China F-Information Science, Vol.55, No.9, pp.2139-2148, 2012.
|
M. Bellare, D. Pointcheval and P. Rogaway, "Authenticated key exchange secure against dictionary attacks", Proceedings of Eurocrypt, Brugge, Belgium, pp.139-155, 2000.
|
M. Bellare and P. Rogaway, "The auth-a protocol for password-based authenticated key exchange", Contributions to IEEE P1363, Technical Report, IEEE, 2000.
|
S. Bellovin and M. Merritt, "Encrypted key exchange:password-based protocols secure against dictionary attacks", Proceedings of IEEE Symposium, IEEE Security and Privacy, Oakland, California, USA, pp.72-84, 1992.
|
D.G. Feng and W.D. Chen, "Security model and modular design of fair authentication key exchange protocols", Science China F-Information Science, Vol.53, No.2, pp.278-287, 2010.
|
J.Z. Luo and M. Yang, "Analysis of security protocols based on challenge-response", Science China F-Information Science, Vol.50, No.2, pp.137-153, 2007.
|
C. Wan, A. Hu and J. Zhang, "An elliptic curve based handoff authentication protocol for wlan", Chinese Journal of Electronics, Vol.39, No.1, pp.165-169, 2011.
|
D.G. Feng and W.D. Chen, "Modular approach to the design and analysis of password-based security protocols", Science China F-Information Science, Vol.50, No.3, pp.381-398, 2007.
|
M.S. Hwang and L.H. Li, "A new remote user authentication scheme using smart cards", IEEE Transactions on Consumer Electronics, Vol.46, No.1, pp.28-30, 2000.
|
G.M. Yang, D.S. Wong, H.X. Wang, et al., "Two-factor mutual authentication based on smart cards and passwords", Journal of Computer and System Sciences, Vol.74, No.7, pp.1160-1172, 2008.
|
W.S. Juang, S.T. Chen and H.T. Liaw, "Robust and efficient password authenticated key agreement using smart cards", IEEE Transaction on Industrial Electronics, Vol.55, No.6, pp.2551-2556, 2008.
|
D.Z. Sun, J.P. Huai, J.Z Sun, et al., "Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards", IEEE Transaction on Industrial Electronics, Vol.56, No.6, pp.2284-2291, 2009.
|
X.X. Li, W.D. Qiu, D. Zheng, et al.,"Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards", IEEE Transaction on Industrial Electronics, Vol.57, No.2, pp.793-800, 2010.
|
X.W. Li and Y.Q. Zhang, "A simple and robust anonymous two-factor authenticated key exchange protocol", Security and Communication Networks, Vol.6, No.6, pp.711-722, 2013.
|
X.W. Li, Y.Q. Zhang, G.F. Zhang, et al., "Strongly secure authenticated key agreement protocol using smart card", Acta Electronica Sinica, Vol.42, No.8, pp.1587-1593, 2014. (in Chinese)
|
S.K. Sood, "Dynamic identity based authentication protocol for two-server architecture", Journal of Information Security, Vol.3, No.4, pp.326-334, 2012.
|
Z.H. Cai, L.P. Zhang and S.Y. Tang, "Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol based communications", IET Communications, Vol.8, No.1, pp.83-91, 2014.
|
L.P. Zhang, S.Y. Tang and Z.H. Cai, "Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card", International Journal of Communication Systems, Vol.27, No.11, pp.2691-2702, 2014.
|
C. Jiang, W. Jia, K. Gu, et al., "Anonymous authentication without home server in mobile roaming networks", Chinese Journal of Electronics, Vol.22, No.2, pp.382-386, 2013.
|
S. Halevi and H. Krawczyk, "Public-key cryptography and password protocols", Proceedings of ACM Conference on Computer and Communications Security, San Francisco, California, USA, pp.122-131, 1998.
|
J. Xu, W.T. Zhu and D.G. Feng, "An improved smart card based password authentication scheme with provable security", Computer Standards and Interfaces, Vol.31, No.4, pp.723-730, 2009.
|
R. Song, "Advanced smart card based password authentication protocol", Computer Standards and Interfaces, Vol.32, No.5, pp.321-325, 2010.
|
D. Wang and C.G. Ma, "Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards", The Journal of China Universities of Posts and Telecommunications, Vol.19, No.5, pp.104-114, 2012.
|
T. Okamoto and D. Pointcheval, "The gap-problems:A new class of problems for the security of cryptographic schemes", Proceedings of 4th International Workshop on Practice and Theory in Public Key Cryptography, Cheju Island, Korea, pp.104-118, 2001.
|
A.R. Meijer, "Cryptology and the birthday paradox", The UMAP Journal, Vol.17, No.1, pp.71-84, 1996.
|
M. Abdalla, M. Bellare and P. Rogaway, "The oracle diffie-hellman assumptions and an analysis of DHIES", The Cryptographers' Track at RSA Conference, San Francisco, California, USA, pp.143-158, 2001.
|
M. Hwang, and I. Lin, "A simple micro-payment scheme", Journal of Systems and Software, Vol.55, No.3, pp.221-229, 2001.
|
S.K. Hafizul, "Design and analysis of an improved smart card-based remote user password authentication scheme:Improved smart card-based remote user password authentication scheme", International Journal of Communication Systems, DOI:10.1002/dac.2793, 2014.
|