메뉴 건너뛰기




Volumn 3788 LNCS, Issue , 2005, Pages 549-565

Modular security proofs for key agreement protocols

Author keywords

[No Author keywords available]

Indexed keywords

ERROR ANALYSIS; INFORMATION ANALYSIS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; THEOREM PROVING;

EID: 33646756559     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11593447_30     Document Type: Conference Paper
Times cited : (82)

References (27)
  • 1
    • 24144444566 scopus 로고    scopus 로고
    • One-time verifier-based encrypted key exchange
    • S. Vaudenay, editor, Public Key Cryptography - PKC 2005. Springer-Verlag
    • M. Abdalla, O. Chevassut, and D. Pointcheval. One-time verifier-based encrypted key exchange. In S. Vaudenay, editor, Public Key Cryptography - PKC 2005, volume 3386 of LNCS, pages 47-64. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3386 , pp. 47-64
    • Abdalla, M.1    Chevassut, O.2    Pointcheval, D.3
  • 2
    • 35048823512 scopus 로고    scopus 로고
    • Authenticated three party key agreement protocols from pairings
    • K.G. Paterson, editor, Proceedings of 9th IMA International Conference on Cryptography and Coding. Springer-Verlag
    • S.S. Al-Riyami and K.G. Paterson. Authenticated three party key agreement protocols from pairings. In K.G. Paterson, editor, Proceedings of 9th IMA International Conference on Cryptography and Coding, volume 2898 of Lecture Notes in Computer Science, pages 332-359. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2898 , pp. 332-359
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 3
    • 33646826379 scopus 로고    scopus 로고
    • A new two-party identity-based authenticated key agreement
    • P.S.L.M. Barreto and N. McCullagh. A new two-party identity-based authenticated key agreement. Cryptology ePrint Archive, Report 2004/122, 2005. http://eprint.iacr.org/.
    • (2005) Cryptology EPrint Archive, Report , vol.2004 , Issue.122
    • Barreto, P.S.L.M.1    McCullagh, N.2
  • 4
    • 24144458508 scopus 로고    scopus 로고
    • A new two-party identity-based authenticated key agreement
    • Topics in Cryptology - CT-RSA '2005. Springer-Verlag
    • P.S.L.M. Barreto and N. McCullagh. A new two-party identity-based authenticated key agreement. In Topics in Cryptology - CT-RSA '2005, volume 3376 of Lecture Notes in Computer Science, pages 262-274. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 262-274
    • Barreto, P.S.L.M.1    McCullagh, N.2
  • 6
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000. Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 139-155. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 7
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Advances in Cryptology - CRYPTO '93. Springer-Verlag
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology - CRYPTO '93, volume 773 of LNCS, pages 232-249. Springer-Verlag, 1994.
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • Cryptography and Coding. Springer-Verlag
    • S. Blake-Wilson, D. Johnson, and A. Menezes. Key agreement protocols and their security analysis. In Cryptography and Coding, volume 1355 of LNCS, pages 30-45. Springer-Verlag, 1997.
    • (1997) LNCS , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 10
    • 33646180371 scopus 로고    scopus 로고
    • On session key construction in provably-secure key establishment protocols
    • Proceedings of International Conference on Cryptology in Malaysia - Mycrypt 2005. Springer-Verlag
    • C. Boyd, K.-K.R. Choo, and Y. Hitchcock. On session key construction in provably-secure key establishment protocols. In Proceedings of International Conference on Cryptology in Malaysia - Mycrypt 2005, volume 3715 of LNCS, page 116131. Springer-Verlag, 2005. http://eprint.iacr.org/2006/206.
    • (2005) LNCS , vol.3715 , pp. 116131
    • Boyd, C.1    Choo, K.-K.R.2    Hitchcock, Y.3
  • 11
    • 35048899816 scopus 로고    scopus 로고
    • Key agreement using statically keyed authenticators
    • Applied Cryptography and Network Security: Second International Conference, ACNS 2004. Springer-Verlag
    • C. Boyd, W. Mao, and K. Paterson. Key agreement using statically keyed authenticators. In Applied Cryptography and Network Security: Second International Conference, ACNS 2004, volume 3089 of Lecture Notes in Computer Science, pages 388-401. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3089 , pp. 388-401
    • Boyd, C.1    Mao, W.2    Paterson, K.3
  • 12
    • 34548783058 scopus 로고    scopus 로고
    • Tripartite key exchange in the Canetti-Krawczyk proof model
    • Proceedings of 5th International Conference on Cryptology in India INDOCRYPT 2004. Springer-Verlag
    • C. Boyd, J.M. González Nieto, and Y. Hitchcock. Tripartite key exchange in the Canetti-Krawczyk proof model. In Proceedings of 5th International Conference on Cryptology in India INDOCRYPT 2004, volume 3348 of Lecture Notes in Computer Science, pages 388-401. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3348 , pp. 388-401
    • Boyd, C.1    Nieto, J.M.G.2    Hitchcock, Y.3
  • 13
    • 0348155938 scopus 로고    scopus 로고
    • A password-based authenticator: Security proof and applications
    • Proceedings of 4th International Conference on Cryptology in India INDOCRYPT 2003. Springer-Verlag
    • C. Boyd, J.M. González Nieto, Y. Hitchcock, P. Montague, and Y.S.T. Tin. A password-based authenticator: Security proof and applications. In Proceedings of 4th International Conference on Cryptology in India INDOCRYPT 2003, volume 2904 of Lecture Notes in Computer Science, pages 388-401. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2904 , pp. 388-401
    • Boyd, C.1    Nieto, J.M.G.2    Hitchcock, Y.3    Montague, P.4    Tin, Y.S.T.5
  • 14
    • 63449093784 scopus 로고    scopus 로고
    • Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach
    • Information Security and Privacy, 8th Australasian Conference, ACISP 2003. Springer-Verlag
    • C. Boyd, J.M. Gonzáleź Nieto, and Y.S.T. Tin. Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach. In Information Security and Privacy, 8th Australasian Conference, ACISP 2003, volume 2727 of Lecture Notes in Computer Science, pages 166-179. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2727 , pp. 166-179
    • Boyd, C.1    Nieto, J.M.G.2    Tin, Y.S.T.3
  • 15
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • B. Pfitzmann, editor, Advances in Cryptology EUROCRYPT 2001. Springer-Verlag
    • R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In B. Pfitzmann, editor, Advances in Cryptology EUROCRYPT 2001, volume 2045 of LNCS, pages 453-474. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 16
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • L.R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002. Springer-Verlag
    • R. Canetti and H. Krawczyk. Universally composable notions of key exchange and secure channels. In L.R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 337-351. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 17
    • 10444246846 scopus 로고    scopus 로고
    • Identity based authenticated key agreement from pairings
    • L. Chen and C. Kudla. Identity based authenticated key agreement from pairings. Cryptology ePrint Archive, Report 2002/184, 2002. http://eprint.iacr. org/.
    • (2002) Cryptology EPrint Archive, Report , vol.2002 , Issue.184
    • Chen, L.1    Kudla, C.2
  • 18
    • 84942246351 scopus 로고    scopus 로고
    • Identity based authenticated key agreement from pairings
    • IEEE Computer Society Press
    • L. Chen and C. Kudla. Identity based authenticated key agreement from pairings. In IEEE Computer Security Foundations Workshop - CSFW-16 2003, pages 219-233. IEEE Computer Society Press, 2003.
    • (2003) IEEE Computer Security Foundations Workshop - CSFW-16 2003 , pp. 219-233
    • Chen, L.1    Kudla, C.2
  • 20
    • 33646761205 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocol for low power devices
    • Financial Cryptography, 5th International Conference, FC 2001. Springer-Verlag
    • M. Jakobsson and D. Pointcheval. Mutual authentication and key exchange protocol for low power devices. In Financial Cryptography, 5th International Conference, FC 2001, volume 2339 of Lecture Notes in Computer Science, page 178195. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2339 , pp. 178195
    • Jakobsson, M.1    Pointcheval, D.2
  • 21
    • 35048878818 scopus 로고    scopus 로고
    • One-round protocols for two-party authenticated key exchange
    • Applied Cryptography and Network Security: the Second International Conference, ACNS 2004. Springer-Verlag
    • I.R. Jeong, J. Katz, and D.H. Lee. One-round protocols for two-party authenticated key exchange. In Applied Cryptography and Network Security: the Second International Conference, ACNS 2004, volume 3089 of Lecture Notes in Computer Science, pages 220-232. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3089 , pp. 220-232
    • Jeong, I.R.1    Katz, J.2    Lee, D.H.3
  • 22
    • 35248878854 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • D. Boneh, editor, Advances in Cryptology - CRYPTO 2003. Springer-Verlag
    • J. Katz and M. Yung. Scalable protocols for authenticated group key exchange. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 110-125. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2729 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 24
    • 0022660635 scopus 로고
    • On seeking smart public-key-distribution systems
    • T. Matsumoto, Y. Takashima, and H. Imai. On seeking smart public-key-distribution systems. Electronics Letters, E69(2):99-106, 1986.
    • (1986) Electronics Letters , vol.E69 , Issue.2 , pp. 99-106
    • Matsumoto, T.1    Takashima, Y.2    Imai, H.3
  • 25
    • 84937389342 scopus 로고    scopus 로고
    • The gap-problems: A new class of problems for the security of cryptographic schemes
    • K. Kim, editor, Public Key Cryptography - PKC 2001. Springer-Verlag
    • T. Okamoto and D. Pointcheval. The gap-problems: A new class of problems for the security of cryptographic schemes. In K. Kim, editor, Public Key Cryptography - PKC 2001, volume 1992 of LNCS, pages 104-118. Springer-Verlag, 2001.
    • (2001) LNCS , vol.1992 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 26
    • 0004023090 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • V. Shoup. On formal models for secure key exchange. IBM Technical Report RZ 3120, 1999. http://shoup.net/papers.
    • (1999) IBM Technical Report , vol.RZ 3120
    • Shoup, V.1
  • 27
    • 0037142442 scopus 로고    scopus 로고
    • An identity based authenticated key agreement protocol based on the Weil pairing
    • N.P. Smart. An identity based authenticated key agreement protocol based on the Weil pairing. Electronics Letters, 38(13):630-632, 2002.
    • (2002) Electronics Letters , vol.38 , Issue.13 , pp. 630-632
    • Smart, N.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.