메뉴 건너뛰기




Volumn 3376, Issue , 2005, Pages 191-208

Simple password-based encrypted key exchange protocols

Author keywords

Diffie Hellman assumptions; Encrypted key exchange; Password

Indexed keywords

COMPUTATIONAL METHODS; SECURITY OF DATA; SERVERS;

EID: 24144443144     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30574-3_14     Document Type: Conference Paper
Times cited : (279)

References (22)
  • 1
    • 84937579774 scopus 로고    scopus 로고
    • The oracle Diffie-Hellman assumptions and an analysis of DHIES
    • D. Naccache, editor, CT-RSA 2001, Springer-Verlag, Apr.
    • M. Abdalla, M. Bellare, and P. Rogaway. The oracle Diffie-Hellman assumptions and an analysis of DHIES. In D. Naccache, editor, CT-RSA 2001, volume 2020 of LNCS, pages 143-158. Springer-Verlag, Apr. 2001.
    • (2001) LNCS , vol.2020 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 2
    • 33645603831 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols
    • Available from authors' web pages
    • M. Abdalla and D. Pointcheval. Simple password-based encrypted key exchange protocols. Full version of current paper. Available from authors' web pages.
    • Full Version of Current Paper
    • Abdalla, M.1    Pointcheval, D.2
  • 3
    • 35248860702 scopus 로고    scopus 로고
    • A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications
    • E. Biham, editor, EUROCRYPT 2003, Springer-Verlag, May
    • M. Bellare and T. Kohno. A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. In E. Biham, editor, EUROCRYPT 2003, volume 2656 of LNCS, pages 491-506. Springer-Verlag, May 2003.
    • (2003) LNCS , vol.2656 , pp. 491-506
    • Bellare, M.1    Kohno, T.2
  • 4
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • B. Preneel, editor, EUROCRYPT 2000, Springer-Verlag, May
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In B. Preneel, editor, EUROCRYPT 2000, volume 1807 of LNCS, pages 139-155. Springer-Verlag, May 2000.
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 5
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • D. R. Stinson, editor, CRYPTO'93, Springer-Verlag, Aug.
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In D. R. Stinson, editor, CRYPTO'93, volume 773 of LNCS. Springer-Verlag, Aug. 1994.
    • (1994) LNCS , vol.773
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 0001940580 scopus 로고    scopus 로고
    • Provably secure session key distribution - The three party case
    • ACM Press, May
    • M. Bellare and P. Rogaway. Provably secure session key distribution - the three party case. In 28th ACM STOC, pages 57-66. ACM Press, May 1996.
    • (1996) 28th ACM STOC , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • IEEE Computer Society Press, May
    • S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In 1992 IEEE Symposium on Security and Privacy, pages 72-84. IEEE Computer Society Press, May 1992.
    • (1992) 1992 IEEE Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 9
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-Hellman
    • B. Preneel, editor, EUROCRYPT 2000, Springer-Verlag, May
    • V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In B. Preneel, editor, EUROCRYPT 2000, volume 1807 of LNCS, pages 156-171. Springer-Verlag, May 2000.
    • (2000) LNCS , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 10
    • 18744393738 scopus 로고    scopus 로고
    • Security proofs for an efficient password-based key exchange
    • ACM Press, Oct.
    • E. Bresson, O. Chevassut, and D. Pointcheval. Security proofs for an efficient password-based key exchange. In ACM CCS 03. ACM Press, Oct. 2003.
    • (2003) ACM CCS 03
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 11
    • 35048866891 scopus 로고    scopus 로고
    • New security results on encrypted key exchange
    • F. Bao, R. Deng, and J. Zhou, editors, PKC 2004, Springer-Verlag, Mar.
    • E. Bresson, O. Chevassut, and D. Pointcheval. New security results on encrypted key exchange. In F. Bao, R. Deng, and J. Zhou, editors, PKC 2004, volume 2947 of LNCS, pages 145-158. Springer-Verlag, Mar. 2004.
    • (2004) LNCS , vol.2947 , pp. 145-158
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 12
    • 35248822669 scopus 로고    scopus 로고
    • Provably secure threshold password-authenticated key exchange
    • E. Biham, editor, EUROCRYPT 2003, Springer-Verlag, May
    • M. Di Raimondo and R. Gennaro. Provably secure threshold password-authenticated key exchange. In E. Biham, editor, EUROCRYPT 2003, volume 2656 of LNCS, pages 507-523. Springer-Verlag, May 2003.
    • (2003) LNCS , vol.2656 , pp. 507-523
    • Di Raimondo, M.1    Gennaro, R.2
  • 13
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • E. Biham, editor, EUROCRYPT 2003, Springer-Verlag, May
    • R. Gennaro and Y. Lindell. A framework for password-based authenticated key exchange. In E. Biham, editor, EUROCRYPT 2003, volume 2656 of LNCS, pages 524-543. Springer-Verlag, May 2003. http://eprint.iacr.org/2003/032.ps.gz.
    • (2003) LNCS , vol.2656 , pp. 524-543
    • Gennaro, R.1    Lindell, Y.2
  • 14
    • 84880888233 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • J. Kilian, editor, CRYPTO 2001, Springer-Verlag, Aug.
    • O. Goldreich and Y. Lindell. Session-key generation using human passwords only. In J. Kilian, editor, CRYPTO 2001, volume 2139 of LNCS, pages 408-432. Springer-Verlag, Aug. 2001. http://eprint.iacr.org/2000/057.ps.gz.
    • (2001) LNCS , vol.2139 , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 16
    • 18744364016 scopus 로고    scopus 로고
    • IEEE draft standard P1363.2. May. Draft Version 15
    • IEEE draft standard P1363.2. Password-based public key cryptography. http://grouper.ieee.org/groups/1363/passwdPK, May 2004. Draft Version 15.
    • (2004) Password-based Public Key Cryptography
  • 17
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • B. Pfitzmann, editor, EUROCRYPT 2001, Springer-Verlag, May
    • J. Katz, R. Ostrovsky, and M. Yung. Efficient password-authenticated key exchange using human-memorable passwords. In B. Pfitzmann, editor, EUROCRYPT 2001, volume 2045 of LNCS, pages 475-494. Springer-Verlag, May 2001.
    • (2001) LNCS , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 18
    • 0036825859 scopus 로고    scopus 로고
    • Pretty-simple password-authenticated key-exchange under standard assumptions
    • Oct.
    • K. Kobara and H. Imai. Pretty-simple password-authenticated key-exchange under standard assumptions. IEICE Transactions, E85-A(10):2229-2237, Oct. 2002. Also available at http://eprint.iacr.org/2003/038/.
    • (2002) IEICE Transactions , vol.E85-A , Issue.10 , pp. 2229-2237
    • Kobara, K.1    Imai, H.2
  • 19
    • 35248816546 scopus 로고    scopus 로고
    • SIGMA: The "SIGn-and-MAc" approach to authenticated Diffie-Hellman and its use in the IKE protocols
    • D. Boneh, editor, CRYPTO 2003, Springer-Verlag, Aug.
    • H. Krawczyk. SIGMA: The "SIGn-and-MAc" approach to authenticated Diffie-Hellman and its use in the IKE protocols. In D. Boneh, editor, CRYPTO 2003, volume 2729 of LNCS, pages 400-425. Springer-Verlag, Aug. 2003.
    • (2003) LNCS , vol.2729 , pp. 400-425
    • Krawczyk, H.1
  • 20
    • 84937402236 scopus 로고    scopus 로고
    • Password-authenticated key exchange based on RSA
    • T. Okamoto, editor, ASIACRYPT 2000, Springer-Verlag, Dec.
    • P. MacKenzie, S. Patel, and R. Swaminathan. Password-authenticated key exchange based on RSA. In T. Okamoto, editor, ASIACRYPT 2000, volume 1976 of LNCS, pages 599-613. Springer-Verlag, Dec. 2000.
    • (2000) LNCS , vol.1976 , pp. 599-613
    • MacKenzie, P.1    Patel, S.2    Swaminathan, R.3
  • 22
    • 84937438236 scopus 로고    scopus 로고
    • Threshold password-authenticated key exchange
    • M. Yung, editor, CRYPTO 2002, Springer-Verlag, Aug.
    • P. D. MacKenzie, T. Shrimpton, and M. Jakobsson. Threshold password-authenticated key exchange. In M. Yung, editor, CRYPTO 2002, volume 2442 of LNCS, pages 385-400. Springer-Verlag, Aug. 2002.
    • (2002) LNCS , vol.2442 , pp. 385-400
    • MacKenzie, P.D.1    Shrimpton, T.2    Jakobsson, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.