메뉴 건너뛰기




Volumn 3841 LNCS, Issue , 2006, Pages 830-836

Efficient and provably secure client-to-client password-based key exchange protocol

Author keywords

Authenticated key exchange; Dictionary attacks; Different password authentication; Human memorable password; Mobile computing

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; COMPUTATION THEORY; DATA TRANSFER; DECISION THEORY; MATHEMATICAL MODELS;

EID: 33745677007     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11610113_81     Document Type: Conference Paper
Times cited : (24)

References (19)
  • 1
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • LNCS Springer-Verlag
    • M. Abdalla, P. Fouque, and D. Pointcheval, "Password-Based Authenticated Key Exchange in the Three-Party Setting", In Proceedings of PKC 2005, LNCS Vol. 3386, pp. 65-84, Springer-Verlag, 2005.
    • (2005) Proceedings of PKC 2005 , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.2    Pointcheval, D.3
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • LNCS, Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks", In Proceedings of Eurocrypt'00, LNCS Vol.1807, pp. 139-155, Springer-Verlag, 2000.
    • (2000) Proceedings of Eurocrypt'00 , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password based protocols secure against dictionary attacks
    • IEEE
    • S. Bellovin and M. Merrit, "Encrypted key exchange: password based protocols secure against dictionary attacks", In Proceedings of the Symposium on Security and Privacy, pp.72-84, IEEE, 1992.
    • (1992) Proceedings of the Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.1    Merrit, M.2
  • 4
    • 84958755223 scopus 로고    scopus 로고
    • Group diffie-hellman key exchange secure against dictionary attacks
    • LNCS, Springer-Verlag
    • E. Bresson, O. Chevassut, and D. Pointcheval, "Group diffie-hellman key exchange secure against dictionary attacks", In Proceedings of Asiacrypt'02, LNCS Vol. 2501, pp. 497-514, Springer-Verlag, 2002.
    • (2002) Proceedings of Asiacrypt'02 , vol.2501 , pp. 497-514
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 5
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using diffie-hellman
    • LNCS, Springer-Verlag
    • V. Boyko, P. MacKenzie, and S. Patel, "Provably secure password-authenticated key exchange using diffie-hellman", In Proceedings of Eurocrypt'00, LNCS Vol. 1807, pp. 156-171, Springer-Verlag, 2000
    • (2000) Proceedings of Eurocrypt'00 , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 6
    • 84944063128 scopus 로고    scopus 로고
    • Password-authenticated key exchange between clients with different passwords
    • LNCS, Springer-Verlag
    • J. W. Byun, I. R. Jeong, D. H. Lee, and C. Park, "Password- authenticated key exchange between clients with different passwords", In Proceedings of ICICS'02, LNCS Vol. 2513, pp. 134-146, Springer-Verlag, 2002.
    • (2002) Proceedings of ICICS'02 , vol.2513 , pp. 134-146
    • Byun, J.W.1    Jeong, I.R.2    Lee, D.H.3    Park, C.4
  • 7
    • 26444523527 scopus 로고    scopus 로고
    • N-party encrypted Diffie-Hellman key exchange using different passwords
    • LNCS, Springer-Verlag
    • J. W. Byun and D. H. Lee, "N-party Encrypted Diffie-Hellman Key Exchange Using Different Passwords", In Proc. of ACNS05', LNCS Vol. 3531, page 75-90, Springer-Verlag, 2005.
    • (2005) Proc. of ACNS05' , vol.3531 , pp. 75-90
    • Byun, J.W.1    Lee, D.H.2
  • 8
    • 33646835237 scopus 로고    scopus 로고
    • Password-based group key exchange secure against insider guessing attacks
    • LNAI, Springer-Verlag
    • J. W. Byun, D. H. Lee, and J. Lim "Password-Based Group Key Exchange Secure Against Insider Guessing Attacks", In Proc. of CIS 05', LNAI Vol. 3802, page 143-148, Springer-Verlag, 2005.
    • (2005) Proc. of CIS 05' , vol.3802 , pp. 143-148
    • Byun, J.W.1    Lee, D.H.2    Lim, J.3
  • 11
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using uuman-memorable passwords
    • LNCS, Springer-Verlag
    • J. Katz, R. Ostrovsky, and M. Yung, "Efficient password- authenticated key exchange using uuman-memorable passwords", In Proceedings of Eurocrypt'01, LNCS Vol. 2045, pp. 475-494, Springer-Verlag, 2001.
    • (2001) Proceedings of Eurocrypt'01 , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 12
    • 35048854202 scopus 로고    scopus 로고
    • Cryptoanalysis and improvements of password authenticated key exchange scheme between clients with different passwords
    • LNCS, Springer-Verlag
    • J. Kim, S. Kim, J. Kwak, and D. Won, "Cryptoanalysis and improvements of password authenticated key exchange scheme between clients with different passwords", In Proceedings of ICCSA 2004, LNCS Vol. 3044, pp. 895-902, Springer-Verlag, 2004.
    • (2004) Proceedings of ICCSA 2004 , vol.3044 , pp. 895-902
    • Kim, J.1    Kim, S.2    Kwak, J.3    Won, D.4
  • 13
    • 33745352074 scopus 로고    scopus 로고
    • Secure password pocket for distributed web services
    • LNCS, Springer-Verlag
    • J. H. Koo and D. H. Lee, "Secure Password Pocket for Distributed Web Services", In Proc. of NPC 2005, LNCS Vol. 3779, pp. 327-334, Springer-Verlag, 2005.
    • (2005) Proc. of NPC 2005 , vol.3779 , pp. 327-334
    • Koo, J.H.1    Lee, D.H.2
  • 14
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution
    • C. Lin, H. Sun, and T. Hwang, "Three-party encrypted key exchange: attacks and a solution", ACM Operating Systems Review, Vol. 34, No. 4, pp. 12-20, 2000.
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.1    Sun, H.2    Hwang, T.3
  • 15
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • IEEE Press
    • C. Lin, H. Sun, M. Steiner, and T. Hwang, "Three-party encrypted key exchange without server public-keys", IEEE Communications Letters, Vol. 5, No. 12, pp. 497-499, IEEE Press, 2001.
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.1    Sun, H.2    Steiner, M.3    Hwang, T.4
  • 16
    • 26444613363 scopus 로고    scopus 로고
    • Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
    • LNCS Springer-Verlag
    • R. C.-W. Phan and B. Goi, "Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme", In Proceedings of ACNS 2005, LNCS Vol. 3531, pp. 33-39, Springer-Verlag, 2005.
    • (2005) Proceedings of ACNS 2005 , vol.3531 , pp. 33-39
    • Phan, R.C.-W.1    Goi, B.2
  • 17
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudik, and M. Waider, "Refinement and extension of encrypted key exchange", In ACM Operation Sys. Review, Vol. 29, No. 3, pp. 22-30, 1995.
    • (1995) ACM Operation Sys. Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waider, M.3
  • 18
    • 35048872322 scopus 로고    scopus 로고
    • Weakness of a password-authenticated key exchange protocol between clients with different passwords
    • LNCS Springer-Verlag
    • S. Wang, J. Wang, and M. Xu, "Weakness of a password-authenticated key exchange protocol between clients with different passwords", In Proceedings of ACNS 2004, LNCS Vol. 3089, pp. 414-425, Springer-Verlag, 2004.
    • (2004) Proceedings of ACNS 2004 , vol.3089 , pp. 414-425
    • Wang, S.1    Wang, J.2    Xu, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.