메뉴 건너뛰기




Volumn 3531, Issue , 2005, Pages 1-16

Two-server password-only authenticated key exchange

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION ANALYSIS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SERVERS;

EID: 26444562427     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496137_1     Document Type: Conference Paper
Times cited : (63)

References (38)
  • 1
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • LNCS, Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. Adv. in Cryptology - Eurocrypt 2000, LNCS vol. 1807, Springer-Verlag, pp. 139-155, 2000.
    • (2000) Adv. in Cryptology - Eurocrypt 2000 , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • LNCS, Springer-Verlag
    • M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. Adv. in Cryptology - Crypto 1993, LNCS vol. 773, Springer-Verlag, pp. 232-249, 1994.
    • (1994) Adv. in Cryptology - Crypto 1993 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • IEEE
    • S.M. Bellovin and M. Merritt. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. IEEE Symposium on Research in Security and Privacy, IEEE, pp. 72-84, 1992.
    • (1992) IEEE Symposium on Research in Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 6
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • ACM
    • S.M. Bellovin and M. Merritt. Augmented Encrypted Key Exchange: a Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise. 1st ACM Conf. on Computer and Comm. Security, ACM, pp. 244-250, 1993.
    • (1993) 1st ACM Conf. on Computer and Comm. Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 7
    • 0033280383 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols: The multi-user case
    • ACM
    • M. Boyarsky. Public-Key Cryptography and Password Protocols: The Multi-User Case. 7th Ann. Conf. on Computer and Comm. Security, ACM, pp. 63-72, 1999.
    • (1999) 7th Ann. Conf. on Computer and Comm. Security , pp. 63-72
    • Boyarsky, M.1
  • 8
    • 84937550984 scopus 로고    scopus 로고
    • Provably-secure password-authenticated key exchange using Diffie-Hellman
    • LNCS, Springer-Verlag
    • V. Boyko, P. MacKenzie, and S. Patel. Provably-Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Adv. in Cryptology - Eurocrypt 2000, LNCS vol. 1807, Springer-Verlag, pp. 156-171, 2000.
    • (2000) Adv. in Cryptology - Eurocrypt 2000 , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 9
    • 33646717563 scopus 로고    scopus 로고
    • Nightingale: A new two-server approach for authentication with short secrets
    • J. Brainard, A. Juels, B. Kaliski, and M. Szydlo. Nightingale: A New Two-Server Approach for Authentication with Short Secrets. 12th USENIX Security Symp., pp. 201-213, 2003.
    • (2003) 12th USENIX Security Symp. , pp. 201-213
    • Brainard, J.1    Juels, A.2    Kaliski, B.3    Szydlo, M.4
  • 10
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • R. Canetti, O. Goldreich, and S. Halevi. The Random Oracle Methodology, Revisited. J. ACM 51(4): 557-594, 2004.
    • (2004) J. ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 13
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • LNCS, Springer-Verlag
    • R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. Adv. in Cryptology - Crypto 1994, LNCS vol. 839, Springer-Verlag, pp. 174-187, 1994.
    • (1994) Adv. in Cryptology - Crypto 1994 , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 14
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against chosen ciphertext attack
    • LNCS, Springer-Verlag
    • R. Cramer and V. Shoup. A Practical Public Key Cryptosystem Provably Secure Against Chosen Ciphertext Attack. Adv. in Cryptology - Crypto 1998, LNCS vol. 1462, Springer-Verlag, pp. 13-25, 1998.
    • (1998) Adv. in Cryptology - Crypto 1998 , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 16
    • 35248822669 scopus 로고    scopus 로고
    • Provably secure threshold password-authenticated key exchange
    • LNCS, Springer-Verlag
    • M. Di Raimondo and R. Gennaro. Provably Secure Threshold Password-Authenticated Key Exchange. Adv. in Cryptology - Eurocrypt 2003, LNCS vol. 2656, Springer-Verlag, pp. 507-523, 2003.
    • (2003) Adv. in Cryptology - Eurocrypt 2003 , vol.2656 , pp. 507-523
    • Di Raimondo, M.1    Gennaro, R.2
  • 18
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31: 469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • El Gamal, T.1
  • 20
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • LNCS, Springer-Verlag
    • R. Gennaro and Y. Lindell. A Framework for Password-Based Authenticated Key Exchange. Adv. in Cryptology - Eurocrypt 2003, LNCS vol. 2656, Springer-Verlag, pp. 524-543, 2003.
    • (2003) Adv. in Cryptology - Eurocrypt 2003 , vol.2656 , pp. 524-543
    • Gennaro, R.1    Lindell, Y.2
  • 21
    • 84957104180 scopus 로고    scopus 로고
    • Two-party RSA key generation
    • LNCS, Springer-Verlag
    • N. Gilboa. Two-Party RSA Key Generation. Adv. in Cryptology - Crypto 1999, LNCS vol. 1666, Springer-Verlag, pp. 116-129, 1999.
    • (1999) Adv. in Cryptology - Crypto 1999 , vol.1666 , pp. 116-129
    • Gilboa, N.1
  • 22
    • 84880888233 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • LNCS, Springer-Verlag
    • O. Goldreich and Y. Lindell. Session-Key Generation Using Human Passwords Only. Adv. in Cryptology - Crypto 2001, LNCS vol. 2139, Springer-Verlag, pp. 408-432, 2001.
    • (2001) Adv. in Cryptology - Crypto 2001 , vol.2139 , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 25
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon. Strong Password-Only Authenticated Key Exchange. ACM Computer Communications Review 26(5): 5-20, 1996.
    • (1996) ACM Computer Communications Review , vol.26 , Issue.5 , pp. 5-20
    • Jablon, D.1
  • 26
    • 84937539386 scopus 로고    scopus 로고
    • Password authentication using multiple servers
    • LNCS, Springer-Verlag
    • D. Jablon. Password Authentication Using Multiple Servers. RSA Cryptographers' Track 2001, LNCS vol. 2020, Springer-Verlag, pp. 344-360, 2001.
    • (2001) RSA Cryptographers' Track 2001 , vol.2020 , pp. 344-360
    • Jablon, D.1
  • 28
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • LNCS, Springer-Verlag
    • J. Katz, R. Ostrovsky, and M. Yung. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. Adv. in Cryptology - Eurocrypt 2001, LNCS vol. 2045, Springer-Verlag, pp. 475-494, 2001.
    • (2001) Adv. in Cryptology - Eurocrypt 2001 , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 30
    • 84957025686 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • LNCS, Springer-Verlag
    • S. Lucks. Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys. Proc. of the Security Protocols Workshop, LNCS 1361, Springer-Verlag, pp. 79-90, 1997.
    • (1997) Proc. of the Security Protocols Workshop , vol.1361 , pp. 79-90
    • Lucks, S.1
  • 31
    • 84937402236 scopus 로고    scopus 로고
    • Password-authenticated key exchange based on RSA
    • LNCS, Springer-Verlag
    • P. MacKenzie, S. Patel, and R. Swaminathan. Password-Authenticated Key Exchange Based on RSA. Adv. in Cryptology - Asiacrypt 2000, LNCS 1976, Springer-Verlag, pp. 599-613, 2000.
    • (2000) Adv. in Cryptology - Asiacrypt 2000 , vol.1976 , pp. 599-613
    • MacKenzie, P.1    Patel, S.2    Swaminathan, R.3
  • 32
    • 26444507178 scopus 로고    scopus 로고
    • An efficient two-party public-key cryptosystem secure against adaptive chosen-ciphertext attack
    • LNCS, Springer-Verlag
    • P. MacKenzie. An Efficient Two-Party Public-Key Cryptosystem Secure against Adaptive Chosen-Ciphertext Attack. Public Key Cryptography (PKC) 2003, LNCS vol. 2567, Springer-Verlag, pp. 47-61, 2003.
    • (2003) Public Key Cryptography (PKC) 2003 , vol.2567 , pp. 47-61
    • MacKenzie, P.1
  • 34
    • 84880864572 scopus 로고    scopus 로고
    • Two-party generation of DSA signatures
    • LNCS, Springer-Verlag
    • P. MacKenzie and M. Reiter. Two-Party Generation of DSA Signatures. Adv. in Cryptology - Crypto 2001, LNCS vol. 2139, Springer-Verlag, pp. 137-154, 2001.
    • (2001) Adv. in Cryptology - Crypto 2001 , vol.2139 , pp. 137-154
    • MacKenzie, P.1    Reiter, M.2
  • 35
    • 84937438236 scopus 로고    scopus 로고
    • Threshold password-authenticated key exchange
    • LNCS, Springer-Verlag
    • P. MacKenzie, T. Shrimpton, and M. Jakobsson. Threshold Password-Authenticated Key Exchange. Adv. in Cryptology - Crypto 2002, LNCS vol. 2442, Springer-Verlag, pp. 385-400, 2002.
    • (2002) Adv. in Cryptology - Crypto 2002 , vol.2442 , pp. 385-400
    • MacKenzie, P.1    Shrimpton, T.2    Jakobsson, M.3
  • 37
    • 24144440891 scopus 로고    scopus 로고
    • Proofs for two-server password authentication
    • LNCS, Springer-Verlag
    • M. Szydlo and B. Kaliski. Proofs for Two-Server Password Authentication. RSA Cryptographers' Track 2005, LNCS vol. 3376, Springer-Verlag, pp. 227-244, 2005.
    • (2005) RSA Cryptographers' Track 2005 , vol.3376 , pp. 227-244
    • Szydlo, M.1    Kaliski, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.