Zhengzhou University

Displaying 1-2 of 2 results

  • White Papers // Oct 2011

    Improved Two-Factor Authenticated Key Exchange Protocol

    Quite recently, two smart-card-based passwords authenticated key exchange protocols were proposed by Lee et al. and Hwang et al. respectively. However, neither of them achieves two-factor authentication fully since they would become completely insecure once one factor is broken. To overcome these congenital defects, this paper proposes such a secure...

    Provided By Zhengzhou University

  • White Papers // Oct 2009

    Security Weakness in Two Authenticated Key Exchange Protocols

    In ICA3PP 2009, Xinglan Zhang proposed two one-round authenticated key exchange protocols and proved their security in the standard model. In this paper, the authors analyze these two protocols and find that both of them exist some flaws. Authenticated Key Exchange (AKE) protocols enable two party to share common session...

    Provided By Zhengzhou University

  • White Papers // Oct 2009

    Security Weakness in Two Authenticated Key Exchange Protocols

    In ICA3PP 2009, Xinglan Zhang proposed two one-round authenticated key exchange protocols and proved their security in the standard model. In this paper, the authors analyze these two protocols and find that both of them exist some flaws. Authenticated Key Exchange (AKE) protocols enable two party to share common session...

    Provided By Zhengzhou University

  • White Papers // Oct 2011

    Improved Two-Factor Authenticated Key Exchange Protocol

    Quite recently, two smart-card-based passwords authenticated key exchange protocols were proposed by Lee et al. and Hwang et al. respectively. However, neither of them achieves two-factor authentication fully since they would become completely insecure once one factor is broken. To overcome these congenital defects, this paper proposes such a secure...

    Provided By Zhengzhou University