메뉴 건너뛰기




Volumn 3386, Issue , 2005, Pages 65-84

Password-based authenticated key exchange in the three-party setting

Author keywords

Authenticated key exchange; Key distribution; Multi party protocols; Password

Indexed keywords

MATHEMATICAL MODELS; NETWORK PROTOCOLS; PROBABILITY; RANDOM PROCESSES; SERVERS;

EID: 24144491593     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30580-4_6     Document Type: Conference Paper
Times cited : (700)

References (26)
  • 1
    • 1842514161 scopus 로고    scopus 로고
    • The oracle Diffie-Hellman assumptions and an analysis of DHIES
    • LNCS 2020, Springer-Verlag, Apr.
    • M. Abdalla, M. Bellare, and P. Rogaway. The oracle Diffie-Hellman assumptions and an analysis of DHIES. In CT-RSA 2001, LNCS 2020, Springer-Verlag, Apr. 2001.
    • (2001) CT-RSA 2001
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 3
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • LNCS 1109, Springer-Verlag, Aug.
    • M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In CRYPTO'96, LNCS 1109, Springer-Verlag, Aug. 1996.
    • (1996) CRYPTO'96
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 0031351741 scopus 로고    scopus 로고
    • A concrete security treatment of symmetric encryption
    • Oct.
    • M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption. In 38th FOCS, Oct. 1997.
    • (1997) 38th FOCS
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 5
    • 0010254150 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • LNCS 1807, Springer-Verlag, May
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT 2000, LNCS 1807, Springer-Verlag, May 2000.
    • (2000) EUROCRYPT 2000
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Nov.
    • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS 93, Nov. 1993.
    • (1993) ACM CCS 93
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • LNCS 773, Springer-Verlag, Aug.
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO'93, LNCS 773, Springer-Verlag, Aug. 1994.
    • (1994) CRYPTO'93
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 0001940580 scopus 로고    scopus 로고
    • Provably secure session key distribution - The three party case
    • May
    • M. Bellare and P. Rogaway. Provably secure session key distribution - the three party case. In 28th ACM STOC, May 1996.
    • (1996) 28th ACM STOC
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • May
    • S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In 1992 IEEE Symposium on Security and Privacy, May 1992.
    • (1992) 1992 IEEE Symposium on Security and Privacy
    • Bellovin, S.M.1    Merritt, M.2
  • 10
    • 3042657129 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-Hellman
    • LNCS 1807, Springer-Verlag, May
    • V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In EUROCRYPT 2000, LNCS 1807, Springer-Verlag, May 2000.
    • (2000) EUROCRYPT 2000
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 11
    • 35048866891 scopus 로고    scopus 로고
    • New security results on encrypted key exchange
    • LNCS 2947, Springer-Verlag, Mar.
    • E. Bresson, O. Chevassut, and D. Pointcheval. New security results on encrypted key exchange. In PKC 2004, LNCS 2947, Springer-Verlag, Mar. 2004.
    • (2004) PKC 2004
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 12
    • 84944063128 scopus 로고    scopus 로고
    • Password-authenticated key exchange between clients with different passwords
    • LNCS 2513, Springer-Verlag, Dec.
    • J. W. Byun, I. R. Jeong, D. H. Lee, and C.-S. Park. Password-authenticated key exchange between clients with different passwords. In ICICS 02, LNCS 2513, Springer-Verlag, Dec. 2002.
    • (2002) ICICS 02
    • Byun, J.W.1    Jeong, I.R.2    Lee, D.H.3    Park, C.-S.4
  • 13
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • LNCS 2656, Springer-Verlag, May
    • R. Gennaro and Y. Lindell. A framework for password-based authenticated key exchange. In EUROCRYPT 2003, LNCS 2656, Springer-Verlag, May 2003.
    • (2003) EUROCRYPT 2003
    • Gennaro, R.1    Lindell, Y.2
  • 14
    • 84880888233 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • LNCS 2139, Springer-Verlag, Aug.
    • O. Goldreich and Y. Lindell. Session-key generation using human passwords only. In CRYPTO 2001, LNCS 2139, Springer-Verlag, Aug. 2001.
    • (2001) CRYPTO 2001
    • Goldreich, O.1    Lindell, Y.2
  • 16
    • 23044527599 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • LNCS 2045, Springer-Verlag, May
    • J. Katz, R. Ostrovsky, and M. Yung. Efficient password-authenticated key exchange using human-memorable passwords. In EUROCRYPT 2001, LNCS 2045, Springer-Verlag, May 2001.
    • (2001) EUROCRYPT 2001
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 17
    • 35248816546 scopus 로고    scopus 로고
    • SIGMA: The "SIGn-and-MAc" approach to authenticated DiffieHellman and its use in the ike protocols
    • LNCS 2729, Springer-Verlag, Aug.
    • H. Krawczyk. SIGMA: The "SIGn-and-MAc" approach to authenticated DiffieHellman and its use in the ike protocols. In CRYPTO 2003, LNCS 2729, Springer-Verlag, Aug. 2003.
    • (2003) CRYPTO 2003
    • Krawczyk, H.1
  • 18
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution
    • Oct.
    • C.-L. Lin, H.-M. Sun, and T. Hwang. Three-party encrypted key exchange: Attacks and a solution. ACM SIGOPS Operating Systems Review, 34(4): 12-20, Oct. 2000.
    • (2000) ACM SIGOPS Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.-L.1    Sun, H.-M.2    Hwang, T.3
  • 19
    • 0013276119 scopus 로고    scopus 로고
    • Password-authenticated key exchange based on RSA
    • LNCS 1976, Springer-Verlag, Dec.
    • P. MacKenzie, S. Patel, and R. Swaminathan. Password-authenticated key exchange based on RSA. In ASIACRYPT 2000, LNCS 1976, Springer-Verlag, Dec. 2000.
    • (2000) ASIACRYPT 2000
    • MacKenzie, P.1    Patel, S.2    Swaminathan, R.3
  • 20
    • 84937438236 scopus 로고    scopus 로고
    • Threshold password-authenticated key exchange
    • LNCS 2442, Springer-Verlag, Aug.
    • P. MacKenzie, T. Shrimpton, and M. Jakobsson. Threshold password-authenticated key exchange. In CRYPTO 2002, LNCS 2442, Springer-Verlag, Aug. 2002.
    • (2002) CRYPTO 2002
    • MacKenzie, P.1    Shrimpton, T.2    Jakobsson, M.3
  • 21
    • 33645605444 scopus 로고    scopus 로고
    • The PAK suite: Protocols for password-authenticated key exchange
    • P. D. MacKenzie. The PAK suite: Protocols for password-authenticated key exchange. Contributions to IEEE P1363.2, 2002.
    • (2002) Contributions to IEEE P1363.2
    • MacKenzie, P.D.1
  • 22
    • 0018048246 scopus 로고
    • Using encryption for authentication in large net-works of computers
    • Dec.
    • R. Needham and M. Schroeder. Using encryption for authentication in large net-works of computers. Communications of the ACM, 21(21):993-999, Dec. 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.21 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 23
    • 35248822669 scopus 로고    scopus 로고
    • Provably secure threshold password-authen-ticated key exchange
    • LNCS 2656, Springer-Verlag, May
    • M. D. Raimondo and R. Gennaro. Provably secure threshold password-authen-ticated key exchange. In EUROCRYPT 2003, LNCS 2656, Springer-Verlag, May 2003.
    • (2003) EUROCRYPT 2003
    • Raimondo, M.D.1    Gennaro, R.2
  • 24
    • 0004023090 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • IBM
    • V. Shoup. On formal models for secure key exchange. Technical Report RZ 3120, IBM, 1999.
    • (1999) Technical Report , vol.RZ 3120
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.