<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232018000100009</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[An efficient 3D Diffie-Hellman based Two-Server password-only authenticated key exchange]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Kumari K]]></surname>
<given-names><![CDATA[Anitha]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sadasivam G]]></surname>
<given-names><![CDATA[Sudha]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,PSG College of Technology Department of IT ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>India</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,PSC Oollege of Technology Department of CSE ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>India</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2018</year>
</pub-date>
<volume>16</volume>
<numero>1</numero>
<fpage>9</fpage>
<lpage>21</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232018000100009&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232018000100009&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232018000100009&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: In emerging technological world, security potentially remains as a highest challenge in the large-scale distributed systems, as it is suffering extensively with adversaria! attacks due to insufficient mutual authentication. In order to address this, a state-of-art tetrahedron (3D) based two-server Password Authenticated and Key Exchange (PAKE) protocol has been formulated with formal proof of security by incorporating the elementary properties of plañe geometry. The main intention of this work is, obtaining a password from the stored credentials must be infeasible when both the servers compromised together. At the outset to realize these goals, in this paper, the properties of the tetrahedron are utilized along with Diffie-Hellman (DH) key exchange algorithm to withstand against malicious attacks. A significant aspect of the proposed 3D PAKE protocol is, client side complexity has been reduced to a greater extent in terms of computation and communication. Both theoretically and practically, 3D PAKE protocol is the first demonstrable secure two-server PAKE protocol that breaks the assumptions of the Yang et al. and Yi et al. protocol that the two servers must not compromise together. Computational complexity, communication complexity, security key principies, best of all attacks happening dubiously are considered as the evaluation parameters to compare the performance of the proposed 3D PAKE protocol.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[3D PAKE protocol]]></kwd>
<kwd lng="en"><![CDATA[tetrahedron property analysis]]></kwd>
<kwd lng="en"><![CDATA[Diffie-Hellman key exchange]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abdalla]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Chevassut]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Fouque]]></surname>
<given-names><![CDATA[P. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Pointcheval]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A simple threshold authenticated key exchange from short secrets]]></article-title>
<source><![CDATA[Lechare Notes in Computer Science]]></source>
<year>2005</year>
<volume>3788</volume>
<page-range>566-84</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bellare]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rogaway]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Random oracles are practica!: A paradigm for designing efficient protocols]]></source>
<year>1993</year>
<conf-name><![CDATA[ lConference on Computer and Communications Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>62-73</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bellovin]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Merritt]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Limitations of the Kerberos authentication system]]></article-title>
<source><![CDATA[ACM SIGCOMM Computer Communication Review]]></source>
<year>1990</year>
<volume>20</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>119-32</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bellovin]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Merritt]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Encrypted key exchange: Password-based protocols secure against dictionary attacks]]></source>
<year>1992</year>
<conf-name><![CDATA[ IEEE Proceedings of the Symposium on Security and Privacy]]></conf-name>
<conf-loc> </conf-loc>
<page-range>72-84</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boneh]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The decisión diffie-hellman problem]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>1998</year>
<volume>1423</volume>
<page-range>48-63</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Byun]]></surname>
<given-names><![CDATA[J. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[D. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lim]]></surname>
<given-names><![CDATA[J. I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol]]></article-title>
<source><![CDATA[IEEE Communications Letters]]></source>
<year>2006</year>
<volume>10</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>683-5</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chien]]></surname>
<given-names><![CDATA[H. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[T. C]]></given-names>
</name>
<name>
<surname><![CDATA[Yeh]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Provably secure gateway-oriented password-based authenticated key exchange protocol resistant to password guessing attacks]]></article-title>
<source><![CDATA[Journal of Information Science and Engineering]]></source>
<year>2013</year>
<volume>29</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>249-65</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Choate]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Tetrahedral Treats]]></source>
<year>1976</year>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chouksey]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Yogadhar]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An efficient password based two-server authentication and pre-shared key exchange system using smart cards]]></article-title>
<source><![CDATA[International Journal of Computer Science and Information Technologies]]></source>
<year>2013</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>117-20</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dermis]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Final Report on Diginotar Hack Shows Total Compromise of CA Servers]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jack]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Construction of a Triangle from Circumcenter]]></source>
<year>2008</year>
<publisher-name><![CDATA[Orthocenter and Incenter]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jin]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wong]]></surname>
<given-names><![CDATA[D. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An efficient password-only two-server authenticated key exchange system]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>2007</year>
<page-range>44-56</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Katz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[MacKenzie]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Taban]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Gligor]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Two-server password-only authenticated key exchange]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>2005</year>
<volume>3531</volume>
<page-range>1-16</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumari]]></surname>
<given-names><![CDATA[K. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sadasivarn]]></surname>
<given-names><![CDATA[G. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Akash]]></surname>
<given-names><![CDATA[S. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Secure Android Application with Integration of Wearables for Healthcare Monitoring System Using 3D ECCDH PAKE Protocol]]></article-title>
<source><![CDATA[Journal of Medical Imaging and Health Informatics]]></source>
<year>2016</year>
<volume>6</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1548-51</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumari]]></surname>
<given-names><![CDATA[K. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sadasivarn]]></surname>
<given-names><![CDATA[G. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rohini]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Efficient 3D Elliptic Curve Diffie-Hellman (ECDH) Based Two-Server Password-Only Authenticated Key Exchange Protocol with Provable Security]]></article-title>
<source><![CDATA[IEEE Journal of Research]]></source>
<year>2016</year>
<volume>62</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>762-73</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[J. H]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[D. H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Secure and efficient password-based authenticated key exchange protocol for two-server architecture]]></source>
<year>2007</year>
<conf-name><![CDATA[ Conference on Convergence Information Technology]]></conf-name>
<conf-loc> </conf-loc>
<page-range>2102-7</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[C. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[H. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hwang]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Three-party encrypted key exchange: attacks and a solution]]></article-title>
<source><![CDATA[ACM SIGOPS Operating Systems Review]]></source>
<year>2000</year>
<volume>34</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>12-20</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[MacKenzie]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Shrimpton]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Jakobsson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Threshold password-authenticated key exchange]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>2002</year>
<volume>2442</volume>
<page-range>385-400</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pooja]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Shilpi]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sujata]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Vinita]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Secured authentication: 3d password]]></article-title>
<source><![CDATA[International Journal of Engineering and Management Sciences]]></source>
<year>2012</year>
<volume>3</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>242-5</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rajan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Review and investigations on future research directions of mobile based telecare system for cardiac surveillance]]></article-title>
<source><![CDATA[Journal of applied research and technology]]></source>
<year>2015</year>
<volume>13</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>454-60</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sood]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dynamic identity based authentication protocol for two-server architecture]]></article-title>
<source><![CDATA[Journal of Information Security]]></source>
<year>2012</year>
<volume>3</volume>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wan]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Deng]]></surname>
<given-names><![CDATA[R. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Bao]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Preneel]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[nPAKE+: A hierarchical group password-authenticated key exchange protocol using different passwords]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>2007</year>
<volume>4861</volume>
<page-range>31-43</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Deng]]></surname>
<given-names><![CDATA[R. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Bao]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A practica! password-based two-server authentication and key exchange system]]></article-title>
<source><![CDATA[IEEE Transactions on Dependahle and Secure Computing]]></source>
<year>2006</year>
<volume>3</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>105-14</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yi]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Ling]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Efficient two-server password-only authenticated key exchange]]></article-title>
<source><![CDATA[IEEE transactions on Parallel and Distributed systems]]></source>
<year>2013</year>
<volume>24</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1773-82</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
