Applied Mathematics & Information Sciences
Abstract
Recently, Chen et al. proposed a three-party encrypted key exchange (3PEKE) protocol with password authentication which is called CCLC-3PEKE. The protocol simultaneously possesses round and computation efficiencies. However, the protocol is vulnerable to replaying attacks. Since the protocol is currently one of the most superior of all 3PEKE protocols, it seems valuable to remedy the security weakness and enhance their efficiency. Hence, we shall propose an efficient 3PEKE (L-3PEKE) scheme. Compare with other 3PEKE protocols, our proposed L-3PEKE is more secure and efficient.
Suggested Reviewers
N/A
Recommended Citation
Lee, Cheng-Chi; Chen, Shun-Der; and Chen, Chin-Ling
(2012)
"A Computation-Efficient Three-Party Encrypted Key Exchange Protocol,"
Applied Mathematics & Information Sciences: Vol. 06:
Iss.
3, Article 27.
Available at:
https://digitalcommons.aaru.edu.jo/amis/vol06/iss3/27