Abstract
Recently, Park and Park proposed a new two factor authenticated key exchange (PP-TAKE) protocol that can be applied to low-power PDAs in Public Wireless LANs (PWLANs). The current paper proposes an efficient TAKE protocol based upon the PP-TAKE protocol. The computational cost of the proposed TAKE protocol is less than that of the PP-TAKE protocol, as is the number of steps needed to communicate is one fewer in which needs only three steps.
Chapter PDF
Similar content being viewed by others
References
IEEE.: Standard for local and metropolitan area networks-Port based network access control. IEEE Std 802.1x (June 2001)
Park, Y.M., Park, S.K.: Two factor authenticated key exchange (TAKE) protocol in public wireless LANs. IEICE Trans. Commun. E87-B(5), 1382–1385 (2004)
Gong, L.: Efficient network authentication protocols: lower bounds and implementations. Distrib. Comput. 9(3), 131–145 (1995)
Lee, T.F., Hwang, T., Lin, C.L.: Enhanced three-party encrypted key exchange without server public keys. Computers & Security 23, 571–577 (2004)
Boneh, D.: The decision Diffie-Hellman problem. In: Proc. Third Algorithmic Number Theory Symposium, pp. 48–63 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoon, EJ., Yoo, KY. (2006). An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds) Computational Science – ICCS 2006. ICCS 2006. Lecture Notes in Computer Science, vol 3992. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11758525_133
Download citation
DOI: https://doi.org/10.1007/11758525_133
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34381-3
Online ISBN: 978-3-540-34382-0
eBook Packages: Computer ScienceComputer Science (R0)