[1] 胡学先, 刘文芬. 对两个三方口令认证密钥交换协议的分析[J]. 信息工程大学学报, 2010, 11(1): 104-107.
[2] Sun Hung-Min, Chen Bing-chang, Hwang T. Secure Key Agree- ment Protocols for Three-party Against Guessing Attacks[J]. Journal of Systems and Software, 2004, 75(1/2): 63-68.
[3] Lee S W, Kim H S, Yoo K Y. Efficient Verifier-based Key Agreement Protocol for Three Parties Without Server’s Public Key[J]. Applied Mathematics and Computation, 2005, 167(1): 996-1003.
[4] Shim K Y, Seo S H. Security Analysis of Password-authenticated Key Agreement Protocols[C]//Proc. of CANS’05. Berlin, Germany: Springer-Verlag, 2005.
[5] Lu Rongxing, Cao Zhenfu. Simple Three-party Key Exchange Protocol[J]. Computers Security, 2007, 26(1): 94-97.
[6] Kim H S, Choi J Y. Enhanced Password-based Simple Three-party Key Exchange Protocol[J]. Computers and Electrical Engineering, 2009, 35(1): 107-114.
[7] Lee Tian-Fu, Hwang T. Simple Password-based Three-party Auth- enticated Key Exchange Without Server Public Keys[J]. Information Science, 2010, 180(9): 1702-1714.
[8] Shin S, Kobara K, Imai H. Security Proof of AugPAKE[EB/OL]. (2010-06-08). http://eprint.iacr.org/2010/334.pdf.
[9] Abdalla M, Fouque P, Pointcheval D. Password-based Authenti- cated Key Exchange in the Three-party Setting[C]//Proc. of PKC’05. Berlin, Germany: Springer-Verlag, 2005.
[10] Yang Junhan, Cao Tianjie. Provably Secure Three-party Password Authenticated Key Exchange Protocol in the Standard Model[J]. Journal of Systems and Software, 2012, 85(2): 340-350. |