메뉴 건너뛰기




Volumn 3989 LNCS, Issue , 2006, Pages 226-238

Cryptanalysis of the N-party encrypted diffie-hellman key exchange using different passwords

Author keywords

Collusion; Cryptanalysis; Dictionary attack; Key privacy; N party; Password authenticated key exchange

Indexed keywords

COPYRIGHTS; DATA PRIVACY; NETWORK PROTOCOLS; ONLINE SYSTEMS; SECURITY OF DATA;

EID: 33746600612     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11767480_15     Document Type: Conference Paper
Times cited : (17)

References (22)
  • 1
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • LNCS 3386, Springer-Verlag
    • M. Abdalla, P.-A. Fouque, and D. Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting. In Proc. PKC '05, LNCS 3386, pp. 65-84, Springer-Verlag, 2005.
    • (2005) Proc. PKC '05 , pp. 65-84
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 2
    • 0034498689 scopus 로고    scopus 로고
    • Remarks on the unknown key-share attacks
    • J. Baek, and K. Kim. Remarks on the Unknown Key-share Attacks. In IEICE Transactions on Fundamentals, Vol. E83-A, No. 12, pp.2766-2769, 2000.
    • (2000) IEICE Transactions on Fundamentals , vol.E83-A , Issue.12 , pp. 2766-2769
    • Baek, J.1    Kim, K.2
  • 3
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • LNCS 1807, Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure against Dictionary Attacks. In Advances in Cryptology - EUROCRYPT '00, LNCS 1807, pp. 139-155, Springer-Verlag, 2000.
    • (2000) Advances in Cryptology - EUROCRYPT '00 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 4
    • 84941157067 scopus 로고    scopus 로고
    • Provably secure key distribution - The three party case
    • M. Bellare, and P. Rogaway. Provably Secure Key Distribution - the Three Party Case. In Proc. ACM-SToC '96, pp. 72-84, 1996.
    • (1996) Proc. ACM-SToC '96 , pp. 72-84
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure Against dictionary attacks
    • IEEE Press
    • S.M. Bellovin, and M. Merritt. Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks. In Proc. IEEE S&P '92, pp. 72-84, IEEE Press, 1992.
    • (1992) Proc. IEEE S&P '92 , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 6
    • 84958755223 scopus 로고    scopus 로고
    • Group Diffie Hellman key exchange secure against dictionary attacks
    • LNCS 2501, Springer-Verlag
    • E. Bresson, O. Chevassut, and D. Pointcheval. Group Diffie Hellman Key Exchange Secure against Dictionary Attacks. In Advances in Cryptology - ASIACRYPT '02, LNCS 2501, pp. 497-514, Springer-Verlag, 2002.
    • (2002) Advances in Cryptology - ASIACRYPT '02 , pp. 497-514
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 7
    • 26444523527 scopus 로고    scopus 로고
    • N-Party encrypted diffie-Hellman key exchange using different passwords
    • LNCS 3531, Springer-Verlag
    • J.W. Byun, and D.H. Lee. N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. In Proc. ACNS '05, LNCS 3531, pp. 75-90, Springer-Verlag, 2005.
    • (2005) Proc. ACNS '05 , pp. 75-90
    • Byun, J.W.1    Lee, D.H.2
  • 8
    • 70350129781 scopus 로고    scopus 로고
    • Comments on weaknesses in two group Diffie-Hellman key exchange protocols
    • J.W. Byun, and D.H. Lee. Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols. IACR ePrint Archive, 2005/209, 2005.
    • (2005) IACR EPrint Archive , vol.2005 , Issue.209
    • Byun, J.W.1    Lee, D.H.2
  • 9
    • 0242372124 scopus 로고    scopus 로고
    • Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party
    • LNCS 2846, Springer-Verlag
    • J.G. Choi, K. Sakurai, and J.H. Park. Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. In Proc. A CNS '03, LNCS 2846, pp. 265-279, Springer-Verlag, 2003.
    • (2003) Proc. A CNS '03 , pp. 265-279
    • Choi, J.G.1    Sakurai, K.2    Park, J.H.3
  • 11
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Y. Ding, and P. Horster. Undetectable On-line Password Guessing Attacks. In ACM Operating Systems Review, Vol. 29, No. 4, pp.77-86, 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 12
    • 0030676227 scopus 로고    scopus 로고
    • Fair exchange with a semi-trusted third party
    • M.K. Franklin, and M.K. Reiter. Fair Exchange with a Semi-trusted Third Party (Extended Abstract). In Proc. ACM-CCS '97, pp. 1-5, 1997.
    • (1997) Proc. ACM-CCS '97 , pp. 1-5
    • Franklin, M.K.1    Reiter, M.K.2
  • 13
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon, Strong Password-only Authenticated Key Exchange. In ACM Computer Communications Review, Vol. 20, No. 5, pp.5-26, 1996.
    • (1996) ACM Computer Communications Review , vol.20 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 14
    • 67649746889 scopus 로고    scopus 로고
    • An Unknown key-share attack on the MQV key agreement protocol
    • B.S. Kaliski, Jr. An Unknown Key-share Attack on the MQV Key Agreement Protocol. In ACM Transactions on Information and System Security, Vol. 4, No. 3, pp.275-288, 2001.
    • (2001) ACM Transactions on Information and System Security , vol.4 , Issue.3 , pp. 275-288
    • Kaliski Jr., B.S.1
  • 15
    • 33745766832 scopus 로고    scopus 로고
    • Modeling insider attacks on group key-exchange protocols
    • J. Katz, and J.S. Shin. Modeling Insider Attacks on Group Key-Exchange Protocols. In Proc. ACM-CCS '05, pp. 180-189, 2005.
    • (2005) Proc. ACM-CCS '05 , pp. 180-189
    • Katz, J.1    Shin, J.S.2
  • 16
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution
    • C.-L. Lin, H.-M. Sun and T. Hwang. Three-Party Encrypted Key Exchange: Attacks and a Solution. In ACM Operating Systems Review, Vol. 34, No. 4, pp. 12-20, 2000.
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.-L.1    Sun, H.-M.2    Hwang, T.3
  • 17
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • IEEE Press
    • C.-L. Lin, H.-M. Sun, M. Steiner and T. Hwang. Three-Party Encrypted Key Exchange Without Server Public-Keys. In IEEE Communication Letters, Vol. 5, No. 12, pp.497-499, IEEE Press, 2001.
    • (2001) IEEE Communication Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.-L.1    Sun, H.-M.2    Steiner, M.3    Hwang, T.4
  • 18
    • 56049092580 scopus 로고    scopus 로고
    • Efficient identity-based conference key distribution protocols
    • LNCS 1438, Springer-Verlag
    • S. Saeednia, and R. Safavi-Naini. Efficient Identity-based Conference Key Distribution Protocols. In Proc. ACISP '98, LNCS 1438, pp. 320-331, Springer-Verlag, 1998.
    • (1998) Proc. ACISP '98 , pp. 320-331
    • Saeednia, S.1    Safavi-Naini, R.2
  • 19
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • Elsevier
    • V. Shmatikov, arid J.C. Mitchell. Finite-state Analysis of Two Contract Signing Protocols. In Theoretical Computer Science, Vol. 283, No. 2, pp.419-450, Elsevier, 2002.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.C.2
  • 20
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudik, and M. Waider. Refinement and Extension of Encrypted Key Exchange. In ACM Operating Systems Review, Vol. 29, No. 3, pp.22-30, 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waider, M.3
  • 21
    • 33646850611 scopus 로고    scopus 로고
    • Weaknesses in two group Diffie-Hellman key exchange protocols
    • Q. Tang, and L. Chen. Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols. IACR ePrint Archive, 2005/197, 2005.
    • (2005) IACR EPrint Archive , vol.2005 , Issue.197
    • Tang, Q.1    Chen, L.2
  • 22
    • 35248832186 scopus 로고    scopus 로고
    • Validating digital signatures without TTP's time-stamping and certificate revocation
    • LNCS 2851, Springer-Verlag
    • J. Zhou, F. Bao, and R.H. Deng. Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. In Proc. ISC '03, LNCS 2851, pp. 96-110, Springer-Verlag, 2003.
    • (2003) Proc. ISC '03 , pp. 96-110
    • Zhou, J.1    Bao, F.2    Deng, R.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.