Efficient and practical DHEKE protocols

Chun Li Lin, Hung Min Sun, Tzonelih Hwang

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)

Abstract

In 1992, Bellovin and Merritt proposed Encrypted Key Exchange (EKE) protocols for preventing dictionary attacks on weak chosen passwords. In 1995, Steiner, Tsudik, and Waidner proposed a minimal DHEKE protocol which simplified the Diffie-Hellman based one of Bellovin and Merritts' protocols. In this paper, we propose two improvements on the minimal DHEKE protocol. These two improvements can reduce the computational cost further.

Original languageEnglish
Pages (from-to)41-47
Number of pages7
JournalOperating Systems Review (ACM)
Volume35
Issue number1
DOIs
Publication statusPublished - 2001 Jan

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Efficient and practical DHEKE protocols'. Together they form a unique fingerprint.

Cite this