메뉴 건너뛰기




Volumn 19, Issue 3, 2006, Pages 241-340

Session-key generation using human passwords only

Author keywords

[No Author keywords available]

Indexed keywords

COMBINATORIAL MATHEMATICS; NETWORK PROTOCOLS; POLYNOMIALS; QUERY LANGUAGES;

EID: 33745184723     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-006-0233-z     Document Type: Article
Times cited : (43)

References (54)
  • 2
    • 33746365751 scopus 로고
    • Secure multi-party protocols and zero-knowledge proof systems tolerating a fault minority
    • D. Beaver. Secure Multi-Party Protocols and Zero-Knowledge Proof Systems Tolerating a Fault Minority. Journal of Cryptology, 4(2):75-122, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 4
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Springer-Verlag (LNCS 1807), Berlin
    • M. Bellare, D. Pointcheval and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In EUROCRYPT '00, pages 139-155. Springer-Verlag (LNCS 1807), Berlin, 2000.
    • (2000) EUROCRYPT '00 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Springer-Verlag (LNCS 773), Berlin
    • M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In CRYPTO '93, pages 232-249. Springer-Verlag (LNCS 773), Berlin, 1994.
    • (1994) CRYPTO '93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 0006578697 scopus 로고    scopus 로고
    • Certifying permutations: Non-interactive zero-knowledge based on any trapdoor permutation
    • M. Bellare and M. Yung. Certifying Permutations: Non-Interactive Zero-Knowledge Based on Any Trapdoor Permutation. Journal of Cryptology, 9(3):149-166, 1996.
    • (1996) Journal of Cryptology , vol.9 , Issue.3 , pp. 149-166
    • Bellare, M.1    Yung, M.2
  • 10
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • S.M. Bellovin and M. Merritt. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise. In Proceedings of the 1st ACM Conference on Computer and Communication Security, pages 244-250, 1993.
    • (1993) Proceedings of the 1st ACM Conference on Computer and Communication Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 12
    • 84949995981 scopus 로고
    • An efficient probabilistic public-key encryption scheme which hides all partial information
    • Springer-Verlag (LNCS 196), Berlin
    • M. Blum and S. Goldwasser. An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information. In CRYPTO '84, pages 289-302. Springer-Verlag (LNCS 196), Berlin, 1985.
    • (1985) CRYPTO '84 , pp. 289-302
    • Blum, M.1    Goldwasser, S.2
  • 13
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM Journal of Computation, 13(4):850-864, 1984.
    • (1984) SIAM Journal of Computation , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 15
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using diffie-hellman
    • Springer-Verlag (LNCS 1807), Berlin
    • V. Boyko, P. MacKenzie and S. Patel. Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman. In EUROCRYPT '00, pages 156-171. Springer-Verlag (LNCS 1807), Berlin, 2000.
    • (2000) EUROCRYPT '00 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 16
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multi-party cryptographic protocols
    • R. Canetti. Security and Composition of Multi-Party Cryptographic Protocols. Journal of Cryptology, 13(1):143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 19
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Springer-Verlag (LNCS 2045), Berlin
    • R. Canetti and H. Krawczyk. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In EUROCRYPT '01, pages 453-474. Springer-Verlag (LNCS 2045), Berlin, 2001.
    • (2001) EUROCRYPT '01 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 28
    • 0000108216 scopus 로고    scopus 로고
    • How to construct constant-round zero-knowledge proof systems for NP
    • O. Goldreich and A. Kahan. How to Construct Constant-Round Zero-Knowledge Proof Systems for NP. Journal of Cryptology, 9(3):167-190, 1996.
    • (1996) Journal of Cryptology , vol.9 , Issue.3 , pp. 167-190
    • Goldreich, O.1    Kahan, A.2
  • 30
    • 0023545076 scopus 로고
    • How to play any mental game - A completeness theorem for protocols with honest majority
    • For details see Chapter 7 of [26]
    • O. Goldreich, S. Micali and A. Wigderson. How to Play Any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In Proceedings of the 19th ACM Symposium on the Theory of Computing, pages 218-229, 1987. For details see Chapter 7 of [26].
    • (1987) Proceedings of the 19th ACM Symposium on the Theory of Computing , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 31
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    • O. Goldreich, S. Micali and A. Wigderson. Proofs that Yield Nothing but Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems. Journal of the ACM, 38(1):691-729, 1991.
    • (1991) Journal of the ACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 33
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali and C. Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM Journal on Computing, 18(1):186-208, 1989.
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 36
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D.P. Jablon. Strong Password-Only Authenticated Key Exchange. SIGCOMM Computer Communications Review, 26(5):5-26, 1996.
    • (1996) SIGCOMM Computer Communications Review , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.P.1
  • 37
    • 84945132563 scopus 로고    scopus 로고
    • Practical password-authenticated key exchange provably secure under standard assumptions
    • Springer-Verlag (LNCS 2045), Berlin
    • J. Katz, R. Ostrovsky and M. Yung. Practical Password-Authenticated Key Exchange Provably Secure under Standard Assumptions. In EUROCRYPT '01, pages 475-494. Springer-Verlag (LNCS 2045), Berlin, 2001.
    • (2001) EUROCRYPT '01 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 40
    • 35048833033 scopus 로고    scopus 로고
    • Parallel coin-tossing and constant-round secure two-party computation
    • Springer-Verlag (LNCS 2139), Berlin
    • Y. Lindell. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. In CRYPTO '01, pages 171-189. Springer-Verlag (LNCS 2139), Berlin, 2001.
    • (2001) CRYPTO '01 , pp. 171-189
    • Lindell, Y.1
  • 41
    • 84957025686 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks Without encrypting public keys
    • Springer-Verlag (LNCS 1361), Berlin
    • S. Lucks. Open Key Exchange: How to Defeat Dictionary Attacks without Encrypting Public Keys. In Security Protocols, 5th International Workshop, pages 79-90. Springer-Verlag (LNCS 1361), Berlin, 1998.
    • (1998) Security Protocols, 5th International Workshop , pp. 79-90
    • Lucks, S.1
  • 43
    • 84974655726 scopus 로고
    • Secure Computation. Unpublished manuscript, 1992
    • Preliminary version, Springer-Verlag (LNCS 576), Berlin
    • S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO '91, pages 392-404, Springer-Verlag (LNCS 576), Berlin, 1991.
    • (1991) CRYPTO '91 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 44
    • 0141544069 scopus 로고    scopus 로고
    • Zero-knowledge arguments for NP can be based on general assumptions
    • M. Naor, R. Ostrovsky, R. Venkatesan and M. Yung. Zero-Knowledge Arguments for NP Can Be Based on General Assumptions. Journal of Cryptology, 11(2):87-108, 1998.
    • (1998) Journal of Cryptology , vol.11 , Issue.2 , pp. 87-108
    • Naor, M.1    Ostrovsky, R.2    Venkatesan, R.3    Yung, M.4
  • 46
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 48
    • 84957621865 scopus 로고    scopus 로고
    • On the concurrent composition of zero-knowledge proofs
    • Springer-Verlag (LNCS 1592), Berlin
    • R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In EUROCRYPT '99, pages 415-431. Springer-Verlag (LNCS 1592), Berlin, 1999.
    • (1999) EUROCRYPT '99 , pp. 415-431
    • Richardson, R.1    Kilian, J.2
  • 49
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. Rivest, A. Shamir and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 50
    • 0004023090 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • Report 1999/012
    • V. Shoup. On Formal Models for Secure Key Exchange. Cryptology ePrint Archive, Report 1999/012, http://eprint.iacr.org/.
    • Cryptology ePrint Archive
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.