Downloads: 104 | Views: 292
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.1 / 10
A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols
Shivani Bhatia, Rekha Saraswat
Abstract: Cryptographic protocols for key exchange have an aim of secure exchange of secret keys over the public network. Password based authenticated key exchange (PAKE) protocols are popularly used for communication purposes due to their convenience. As the name suggests, it involves sharing of a human-memorable password by each entity with a trusted third party. Three party PAKE (3-PAKE) protocols allow two parties to authenticate each other via the trusted third party and establish a session key between them for further communication. Various 3-PAKE protocols have been proposed over the years, each having its own weaknesses and strengths. This paper presents a review of few such 3-PAKE protocols and gives suggestions for future enhancements.
Keywords: key-exchange, authentication, password, three-party
Edition: Volume 4 Issue 4, April 2015
Pages: 1415 - 1419
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 12 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021
Pages: 788 - 791A New Cryptography Algorithm Based on ASCII Code
Yaser M.A. Abualkas
Downloads: 89
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2067 - 2068An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective
Ashish A Kulkarni, Dr. Shivaji R. Madan
Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 1760 - 1762A Survey on Existing Password Storage Methods and their Security
Samruddhi Patil, Kumud Wasnik
Downloads: 103
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2338 - 2340Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device
Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar
Downloads: 103
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva