Improvement of Lee-Kim-Yoo Password-Based Key Agreement Scheme
- Resource Type
- Conference
- Authors
- Zhang, R.; He, D.; Chen, J.
- Source
- 2010 International Conference on Internet Technology and Applications Internet Technology and Applications, 2010 International Conference on. :1-4 Aug, 2010
- Subject
- Computing and Processing
Communication, Networking and Broadcast Technologies
Dictionaries
Protocols
Elliptic curves
Book reviews
Cryptography
Authentication
- Language
Recently, Kwon et al. found that LKY scheme is vulnerable to off-line dictionary attack. They showed that LKY is not a complete PAKA scheme since it is possible for the involved two parties to not share a common session key as a result of executing LKY. In our paper, we will discuss the reasons for the above attack and propose two improved scheme to solve this problem.