메뉴 건너뛰기




Volumn 3531, Issue , 2005, Pages 75-90

N-party encrypted diffie-hellman key exchange using different passwords

Author keywords

Authenticated key exchange; Dictionary attacks; Different password authentication; Encrypted key exchange; N party authentication; Password

Indexed keywords

COMPUTER NETWORKS; MULTICASTING; NETWORK PROTOCOLS; SERVERS;

EID: 26444523527     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496137_6     Document Type: Conference Paper
Times cited : (34)

References (41)
  • 1
    • 84937579774 scopus 로고    scopus 로고
    • The oracle diffie-hellman assumptions and an analysis of DHIES
    • LNCS Springer-Verlag
    • M. Abdalla, M. Bellare, and P. Rogaway, "The oracle diffie-hellman assumptions and an analysis of DHIES", In proceedings of CT-RSA 2001, LNCS Vol. 2020, pp. 143-158, Springer-Verlag, 2001.
    • (2001) Proceedings of CT-RSA 2001 , vol.2020 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 2
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • LNCS Springer-Verlag
    • M. Abdalla, P. Fouque, and D. Pointcheval, "Password-based authenticated key exchange in the three-party setting", In proceedings of PKC'05, LNCS Vol. 3386, pp. 65-84, Springer-Verlag, 2005.
    • (2005) Proceedings of PKC'05 , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.2    Pointcheval, D.3
  • 4
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • LNCS Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks", In proceedings of Eurocrypt'00, LNCS Vol.1807, pp. 139-155, Springer-Verlag, 2000.
    • (2000) Proceedings of Eurocrypt'00 , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • LNCS Springer-Verlag
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution", In proceedings of Crypto'93, LNCS Vol. 773, pp. 232-249. Springer-Verlag, 1994.
    • (1994) Proceedings of Crypto'93 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password based protocols secure against dictionary attacks
    • IEEE
    • S. Bellovin and M. Merrit, "Encrypted key exchange: password based protocols secure against dictionary attacks", In proceedings of the Symposium on Security and Privacy, pp.72-84, IEEE, 1992.
    • (1992) Proceedings of the Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.1    Merrit, M.2
  • 9
    • 26444519832 scopus 로고    scopus 로고
    • A survey of dependability issues in mobile wireless networks
    • LAAS CNRS Toulouse, France, February
    • C. Basile, M-O. Killijian, and D. Powell, "A survey of dependability issues in mobile wireless networks", Technical Report, LAAS CNRS Toulouse, France, February, 2003. Availabe at http://www.crhc.uiuc.edu/~basilecl/papers/ mobile.ps
    • (2003) Technical Report
    • Basile, C.1    Killijian, M.-O.2    Powell, D.3
  • 10
    • 84956854891 scopus 로고    scopus 로고
    • Key establishment protocols for secure mobile communications : A selective survey
    • LNCS Springer-Verlag
    • C. Boyd and A. Mathuria, "Key establishment protocols for secure mobile communications : a selective survey", In proceedings of ACISP 98', LNCS Vol. 1438, pp. 344-355, Springer-Verlag, 1998.
    • (1998) Proceedings of ACISP 98' , vol.1438 , pp. 344-355
    • Boyd, C.1    Mathuria, A.2
  • 11
    • 84958755223 scopus 로고    scopus 로고
    • Group diffie-hellman key exchange secure against dictionary attacks
    • LNCS Springer-Verlag
    • E. Bresson, O. Chevassut, and D. Pointcheval, "Group diffie-hellman key exchange secure against dictionary attacks", In proceedings of Asiacrypt'02, LNCS Vol. 2501, pp. 497-514, Springer-Verlag, 2002.
    • (2002) Proceedings of Asiacrypt'02 , vol.2501 , pp. 497-514
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 13
    • 50849127145 scopus 로고    scopus 로고
    • Provably authenticated group diffie-hellman key exchange in the dynamic case
    • LNCS Springer-Verlag
    • E. Bresson, O. Chevassut, D. Pointcheval, and J. J. Quisquater, "Provably authenticated group diffie-hellman key exchange in the dynamic case", In proceedings of Asiacrypt'01, LNCS Vol. 2248, pp. 290-309, Springer-Verlag, 2001.
    • (2001) Proceedings of Asiacrypt'01 , vol.2248 , pp. 290-309
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3    Quisquater, J.J.4
  • 14
    • 50849092893 scopus 로고    scopus 로고
    • Dynamic group diffie-hellman key exchange under standard assumptions
    • LNCS
    • E. Bresson, O. Chevassut, and D. Pointcheval, "Dynamic group diffie-hellman key exchange under standard assumptions", In proceedings of Eurocrypt'02, LNCS Vol. 2332, pp. 321-336, 2002.
    • (2002) Proceedings of Eurocrypt'02 , vol.2332 , pp. 321-336
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 15
    • 35248849912 scopus 로고    scopus 로고
    • The group diffie-hellman problems
    • LNCS Springer-Verlag
    • E. Bresson, O. Chevassut, and D. Pointcheval, "The group diffie-hellman problems", In proceedings of SAC'02, LNCS Vol. 2595, pp. 325-338, Springer-Verlag, 2002.
    • (2002) Proceedings of SAC'02 , vol.2595 , pp. 325-338
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 16
    • 84944886613 scopus 로고    scopus 로고
    • Ciphers with arbitrary finite domains
    • LNCS Springer-Verlag
    • J. Black and P. Rogaway, "Ciphers with arbitrary finite domains", In proceedings of CT-RSA conference, LNCS Vol. 2271, pp. 114-130, Springer-Verlag, 2001.
    • (2001) Proceedings of CT-RSA Conference , vol.2271 , pp. 114-130
    • Black, J.1    Rogaway, P.2
  • 17
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using diffie-hellman
    • LNCS Springer-Verlag
    • V. Boyko, P. MacKenzie, and S. Patel, "Provably secure password-authenticated key exchange using diffie-hellman", In proceedings of Eurocrypt'00, LNCS Vol. 1807, pp. 156-171, Springer-Verlag, 2000.
    • (2000) Proceedings of Eurocrypt'00 , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 18
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • LNCS Springer-Verlag
    • M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system", In proc. of Eurocrypt'94 LNCS VOL. 950, pp. 275-286, Springer-Verlag, 1994.
    • (1994) Proc. of Eurocrypt'94 , vol.950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 19
    • 84944063128 scopus 로고    scopus 로고
    • Password-authenticated key exchange between clients with different passwords
    • LNCS Springer-Verlag
    • J. Byun, I. Jeong, D. Lee, and C. Park, "Password-authenticated key exchange between clients with different passwords", In proceedings of ICICS'02, LNCS Vol. 2513, pp. 134-146, Springer-Verlag, 2002.
    • (2002) Proceedings of ICICS'02 , vol.2513 , pp. 134-146
    • Byun, J.1    Jeong, I.2    Lee, D.3    Park, C.4
  • 22
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D. Denning and G. Sacco, "Timestamps in key distribution protocols", In Communications of the ACM, Vol. 24, No. 8, pp. 533-536, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 23
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Y. Ding and P. Horster, "Undetectable on-line password guessing attacks", In ACM Operating Systems Review, Vol. 29, No. 4, pp. 77-86, 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 24
    • 84880888233 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • LNCS Springer-Verlag
    • O. Goldreich and Y. Lindell, "Session-key generation using human passwords only", In proceedings of Crypto'01, LNCS Vol. 2139, pp. 408-432, Springer-Verlag, 2001.
    • (2001) Proceedings of Crypto'01 , vol.2139 , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 27
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon, "Strong password-only authenticated key exchange", In Computer Communication Review, Vol.26, No.5, pp. 5-26, 1996.
    • (1996) Computer Communication Review , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 28
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • LNCS Springer-Verlag
    • J. Katz, R. Ostrovsky, and M. Yung, "Efficient password- authenticated key exchange using human-memorable passwords", In proceedings of Eurocrypt'01, LNCS Vol. 2045, pp. 475-494, Springer-Verlag, 2001.
    • (2001) Proceedings of Eurocrypt'01 , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 30
    • 35048854202 scopus 로고    scopus 로고
    • Cryptanalysis and improvements of password authenticated key exchange scheme between clients with different passwords
    • LNCS Springer-Verlag
    • J. Kim, S. Kim, J. Kwak, and D. Won, "Cryptanalysis and Improvements of Password Authenticated Key Exchange Scheme between Clients with Different Passwords", In Proceedings of ICCSA 2004, LNCS Vol. 3044, pp. 895-902, Springer-Verlag, 2004.
    • (2004) Proceedings of ICCSA 2004 , vol.3044 , pp. 895-902
    • Kim, J.1    Kim, S.2    Kwak, J.3    Won, D.4
  • 32
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution
    • C. Lin, H. Sun, and T. Hwang, "Three-party encrypted key exchange: attacks and a solution", In ACM Operating Systems Review, Vol. 34, No. 4, pp. 12-20, 2000.
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.1    Sun, H.2    Hwang, T.3
  • 33
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • IEEE Press
    • G. Lin, H. Sun, M. Steiner, and Tzonelih Hwang, "Three-party Encrypted Key Exchange Without Server Public-Keys", In IEEE Communications Letters, Vol. 5, No. 12, pp. 497-499, IEEE Press, 2001.
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, G.1    Sun, H.2    Steiner, M.3    Hwang, T.4
  • 34
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encryting public keys
    • S. Lucks, "Open key exchange: how to defeat dictionary attacks without encryting public keys", In proceedings of the security protocol workshop '97, pp. 79-90, 1997.
    • (1997) Proceedings of the Security Protocol Workshop '97 , pp. 79-90
    • Lucks, S.1
  • 35
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudik, and M. Waider, "Refinement and extension of encrypted key exchange", In ACM Operation Sys. Review, Vol. 29, No. 3, pp. 22-30, 1995.
    • (1995) ACM Operation Sys. Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waider, M.3
  • 37
    • 84880904783 scopus 로고    scopus 로고
    • OAEP reconsidered
    • LNCS
    • V. Shoup, "OAEP reconsidered", In proceedings of Crypto01', LNCS Vol. 2139, pp. 239-259, 2001.
    • (2001) Proceedings of Crypto01' , vol.2139 , pp. 239-259
    • Shoup, V.1
  • 38
    • 0036538428 scopus 로고    scopus 로고
    • A secure fault-tolerant conference-key agreement protocol
    • W. Tzeng, "A secure fault-tolerant conference-key agreement protocol", In IEEE Transaction on Computers, Vol. 51, No. 4, 2002.
    • (2002) IEEE Transaction on Computers , vol.51 , Issue.4
    • Tzeng, W.1
  • 39
    • 84947922642 scopus 로고    scopus 로고
    • On the design of security protocols for mobile communications
    • LNCS
    • V. Varadharajan and Y. Mu, "On the design of security protocols for mobile communications", In proceedings of ACISP'96, LNCS Vol. 1172, pp. 134-145, 1996.
    • (1996) Proceedings of ACISP'96 , vol.1172 , pp. 134-145
    • Varadharajan, V.1    Mu, Y.2
  • 40
    • 35048872322 scopus 로고    scopus 로고
    • Weakness of a password-authenticated key exchange protocol between clients with different passwords
    • LNCS Springer-Verlag
    • S. Wang, J. Wang, and M. Xu, "Weakness of a Password-authenticated Key Exchange Protocol Between Clients with Different Passwords", In Proceedings of ACNS 2004, LNCS Vol. 3089, pp. 414-425, Springer-Verlag, 2004.
    • (2004) Proceedings of ACNS 2004 , vol.3089 , pp. 414-425
    • Wang, S.1    Wang, J.2    Xu, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.