Applied Mathematics & Information Sciences

Author Country (or Countries)



Recently, Chen et al. proposed a three-party encrypted key exchange (3PEKE) protocol with password authentication which is called CCLC-3PEKE. The protocol simultaneously possesses round and computation efficiencies. However, the protocol is vulnerable to replaying attacks. Since the protocol is currently one of the most superior of all 3PEKE protocols, it seems valuable to remedy the security weakness and enhance their efficiency. Hence, we shall propose an efficient 3PEKE (L-3PEKE) scheme. Compare with other 3PEKE protocols, our proposed L-3PEKE is more secure and efficient.

Suggested Reviewers