Computation-Efficient Three-Party Encrypted Key Exchange for Telecare Medicine Information Systems
Abstract
References
Index Terms
- Computation-Efficient Three-Party Encrypted Key Exchange for Telecare Medicine Information Systems
Recommendations
Cryptanalysis of two three-party encrypted key exchange protocols
Due to the simplicity of maintaining human memorable passwords without any assistant storage device, password-based three-party encrypted key exchange (3PEKE) protocol has become one of the most promising research fields on user authentication and ...
Three-party encrypted key exchange: attacks and a solution
Password-based mechanism is the widely used method for authentication since it allows people to choose their own passwords without any assistant device to generate or store. However, people are used to choose easy-to-remember passwords such that ...
N-Party encrypted diffie-hellman key exchange using different passwords
ACNS'05: Proceedings of the Third international conference on Applied Cryptography and Network SecurityWe consider the problem of password-authenticated group Diffie-Hellman key exchange among N parties, N–1 clients and a single-server, using different passwords. Most password-authenticated key exchange schemes in the literature have focused on an ...
Comments
Information & Contributors
Information
Published In

In-Cooperation
- University of Electronic Science and Technology of China: University of Electronic Science and Technology of China
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- Tzu Chi University
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 72Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
Cited By
View allView Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in