메뉴 건너뛰기




Volumn 3494, Issue , 2005, Pages 404-421

Universally composable password-based key exchange

Author keywords

[No Author keywords available]

Indexed keywords

MATHEMATICAL MODELS; NETWORK PROTOCOLS; PROBABILITY DISTRIBUTIONS; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY;

EID: 24944566824     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11426639_24     Document Type: Conference Paper
Times cited : (186)

References (29)
  • 2
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • LNCS Springer-Verlag
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. Advances in Cryptology - Crypto 1998, LNCS vol. 1462, Springer-Verlag, pp. 26-45, 1998
    • (1998) Advances in Cryptology - Crypto 1998 , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 3
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • LNCS Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. Advances in Cryptology - Eurocrypt 2000, LNCS vol. 1807, Springer-Verlag, pp. 139-155, 2000.
    • (2000) Advances in Cryptology - Eurocrypt 2000 , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 4
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • LNCS Springer-Verlag
    • M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. Advances in Cryptology - Crypto 1993, LNCS vol. 773, Springer-Verlag, pp. 232-249, 1993.
    • (1993) Advances in Cryptology - Crypto 1993 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • IEEE
    • S. M. Bellovin and M. Merritt. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. Proc. IEEE Security and Privacy, IEEE, pp. 72-84, 1992.
    • (1992) Proc. IEEE Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 7
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password authentication and key exchange using Diffie-Hellman
    • LNCS Springer-Verlag
    • V. Boyko, P. MacKenzie, and S. Patel. Provably Secure Password Authentication and Key Exchange Using Diffie-Hellman. Advances in Cryptology - Eurocrypt 2000, LNCS vol. 1807, Springer-Verlag, pp. 156-171, 2000.
    • (2000) Advances in Cryptology - Eurocrypt 2000 , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 9
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • LNCS Springer-Verlag
    • R. Canetti and H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels. Advances in Cryptology - Eurocrypt 2002, LNCS vol. 2332, Springer-Verlag, pp. 337-351, 2002.
    • (2002) Advances in Cryptology - Eurocrypt 2002 , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 10
    • 35248854495 scopus 로고    scopus 로고
    • On the limitations of universal composable two-party computation without set-up assumptions
    • Springer-Verlag (LNCS 2656)
    • R. Canetti, E. Kushilevitz and Y. Lindell. On the Limitations of Universal Composable Two-Party Computation Without Set-Up Assumptions. In EUROCRYPT 2003, Springer-Verlag (LNCS 2656), pages 68-86, 2003.
    • (2003) EUROCRYPT 2003 , pp. 68-86
    • Canetti, R.1    Kushilevitz, E.2    Lindell, Y.3
  • 11
    • 35248819315 scopus 로고    scopus 로고
    • Universal composition with joint state
    • LNCS Springer-Verlag
    • R. Canetti and T. Rabin. Universal Composition with Joint State. Advances in Cryptology - Crypto 2003, LNCS vol. 2729, Springer-Verlag, pp. 265-281, 2003.
    • (2003) Advances in Cryptology - Crypto 2003 , vol.2729 , pp. 265-281
    • Canetti, R.1    Rabin, T.2
  • 12
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • LNCS Springer-Verlag
    • R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. Advances in Cryptology - Crypto 1994, LNCS vol. 839, Springer-Verlag, pp. 174-187, 1994.
    • (1994) Advances in Cryptology - Crypto 1994 , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 13
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • LNCS Springer-Verlag
    • R. Cramer and V. Shoup. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. Advances in Cryptology - Eurocrypt 2002, LNCS vol. 2332, Springer-Verlag, pp. 45-64, 2002.
    • (2002) Advances in Cryptology - Eurocrypt 2002 , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 15
    • 0343337504 scopus 로고    scopus 로고
    • Non-malleable cryptography
    • D. Dolev, C. Dwork, and M. Naor. Non-Malleable Cryptography. SIAM J. Computing 30(2): 391-437, 2000.
    • (2000) SIAM J. Computing , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 16
    • 0003157491 scopus 로고    scopus 로고
    • On-line/off-line digital signatures
    • S. Even, O. Goldreich, and S. Micali. On-Line/Off-Line Digital Signatures. J. Cryptology 9(1):35-67, 1996.
    • (1996) J. Cryptology , vol.9 , Issue.1 , pp. 35-67
    • Even, S.1    Goldreich, O.2    Micali, S.3
  • 17
    • 35248886595 scopus 로고    scopus 로고
    • Strengthening zero-knowledge protocols using signatures
    • LNCS Springer-Verlag
    • J. Garay, P. MacKenzie, and K. Yang. Strengthening Zero-Knowledge Protocols Using Signatures. Advances in Cryptology - Eurocrypt 2003, LNCS vol. 2656, Springer-Verlag, pp. 177-194, 2003.
    • (2003) Advances in Cryptology - Eurocrypt 2003 , vol.2656 , pp. 177-194
    • Garay, J.1    MacKenzie, P.2    Yang, K.3
  • 18
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • LNCS Springer-Verlag
    • R. Gennaro and Y. Lindell. A Framework for Password-Based Authenticated Key Exchange. Advances in Cryptology - Eurocrypt 2003, LNCS vol. 2656, Springer-Verlag, pp. 524-543, 2003.
    • (2003) Advances in Cryptology - Eurocrypt 2003 , vol.2656 , pp. 524-543
    • Gennaro, R.1    Lindell, Y.2
  • 19
    • 84880888233 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • LNCS Springer-Verlag
    • O. Goldreich and Y. Lindell. Session-Key Generation using Human Passwords Only. Advances in Cryptology - Crypto 2001, LNCS vol. 2139, Springer-Verlag, pp. 408-432, 2001.
    • (2001) Advances in Cryptology - Crypto 2001 , vol.2139 , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 24
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • LNCS Springer-Verlag
    • J. Katz, R. Ostrovsky, and M. Yung. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. Advances in Cryptology - Eurocrypt 2001, LNCS vol. 2045, Springer-Verlag, pp. 475-494, 2001.
    • (2001) Advances in Cryptology - Eurocrypt 2001 , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 25
    • 35048882590 scopus 로고    scopus 로고
    • On simulation-sound trapdoor commitments
    • LNCS Springer-Verlag, Available from the ePrint archive, report 2003/252 from
    • P. MacKenzie and K. Yang. On Simulation-Sound Trapdoor Commitments. Advances in Cryptology - Eurocrypt 2004, LNCS vol. 3027, Springer-Verlag, pp. 382-400, 2004. Available from the ePrint archive, report 2003/252 from http://eprint.iacr.org.
    • (2004) Advances in Cryptology - Eurocrypt 2004 , vol.3027 , pp. 382-400
    • MacKenzie, P.1    Yang, K.2
  • 27
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • LNCS Springer-Verlag
    • C. Rackoff and D. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. Advances in Cryptology - Crypto 1991, LNCS vol. 576, Springer-Verlag, pp. 433-444, 1991.
    • (1991) Advances in Cryptology - Crypto 1991 , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.2
  • 28
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
    • IEEE
    • A. Sahai. Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security. 40th IEEE Symposium on Foundations of Computer Science (FOCS), IEEE, pp. 543-553, 1999.
    • (1999) 40th IEEE Symposium on Foundations of Computer Science (FOCS) , pp. 543-553
    • Sahai, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.