메뉴 건너뛰기




Volumn 3989 LNCS, Issue , 2006, Pages 162-177

Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks

Author keywords

CAPTCHA; Key agreement; P2P network; Provable security

Indexed keywords

COPYRIGHTS; DATA REDUCTION; MATHEMATICAL MODELS; NETWORK PROTOCOLS; ONLINE SYSTEMS; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA;

EID: 33746630828     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11767480_11     Document Type: Conference Paper
Times cited : (17)

References (15)
  • 1
    • 33746616167 scopus 로고    scopus 로고
    • Password-based group key exchange in a constant number of rounds
    • LNCS. Springer-Verlag. To Appear
    • M. Abdalla, E. Bresson, O. Chevassut, and D. Pointcheval. Password-based Group Key Exchange in a Constant Number of Rounds. In PKC 2006, LNCS. Springer-Verlag, 2006. To Appear.
    • (2006) PKC 2006
    • Abdalla, M.1    Bresson, E.2    Chevassut, O.3    Pointcheval, D.4
  • 2
    • 35248831179 scopus 로고    scopus 로고
    • CAPTCHA: Using hard AI problems for security
    • EUROCRYPT 2003. Springer-Verlag
    • L. Ahn, M. Blum, N. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. In EUROCRYPT 2003, volume 2656 of LNCS, pages 294-311. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2656 , pp. 294-311
    • Ahn, L.1    Blum, M.2    Hopper, N.3    Langford, J.4
  • 3
    • 84958775356 scopus 로고    scopus 로고
    • Transitive signatures based on factoring and RSA
    • ASIACRYPT 2002. Springer-Verlag
    • M. Bellare and G. Neven. Transitive Signatures Based on Factoring and RSA. In ASIACRYPT 2002, volume 2501 of LNCS, pages 397-414. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2501 , pp. 397-414
    • Bellare, M.1    Neven, G.2
  • 4
    • 84958755223 scopus 로고    scopus 로고
    • Group Diffie-Hellman key exchange secure against dictionary attacks
    • ASIACRYPT 2002. Springer-Verlag
    • E. Bresson, O. Chevassut, and D. Pointcheval. Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks. In ASIACRYPT 2002, volume 2501 of LNCS, pages 497-514. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2501 , pp. 497-514
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 6
    • 0000288916 scopus 로고
    • A secure and efficient conference key distribution system
    • A. D. Santis, editor, LNCS
    • M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System. In A. D. Santis, editor, Pre-Proceedings of EUROCRYPT '94, LNCS, pages 279-290, 1994.
    • (1994) Pre-proceedings of EUROCRYPT '94 , pp. 279-290
    • Burmester, M.1    Desmedt, Y.2
  • 7
    • 26444523527 scopus 로고    scopus 로고
    • N-party encrypted Diffie-Hellman key exchange using different passwords
    • ACNS 2005. Springer-Verlag
    • J. Byun and D. Lee. N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. In ACNS 2005, volume 3531 of LNCS, pages 75-90. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3531 , pp. 75-90
    • Byun, J.1    Lee, D.2
  • 8
    • 35248845972 scopus 로고    scopus 로고
    • Open problems in data-sharing peer-to-peer systems
    • ICDT 2003. Springer-Verlag
    • N. Daswani, H. Garcia-Molina, and B. Yang. Open Problems in Data-Sharing Peer-to-Peer Systems. In ICDT 2003, volume 2572 of LNCS, pages 1-15. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2572 , pp. 1-15
    • Daswani, N.1    Garcia-Molina, H.2    Yang, B.3
  • 10
    • 0002459783 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic defense against connection depletion
    • A. Juels and J. Brainard. Client Puzzles: A Cryptographic Defense Against Connection Depletion. In NDSS 1999, pages 151-165, 1999.
    • (1999) NDSS 1999 , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 11
    • 35048828834 scopus 로고    scopus 로고
    • Efficient password-based group key exchange
    • TrustBus 2004. Springer-Verlag
    • S. M. Lee, J. Y. Hwang, and D. H. Lee. Efficient Password-Based Group Key Exchange. In TrustBus 2004, volume 3184 of LNCS, pages 191-199. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3184 , pp. 191-199
    • Lee, S.M.1    Hwang, J.Y.2    Lee, D.H.3
  • 13
    • 0038687701 scopus 로고    scopus 로고
    • Securing passwords against dictionary attacks
    • ACM Press
    • B. Pinkas and T. Sander. Securing Passwords Against Dictionary Attacks. In ACM CCS 2002, pages 161-170. ACM Press, 2002.
    • (2002) ACM CCS 2002 , pp. 161-170
    • Pinkas, B.1    Sander, T.2
  • 14
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • CRYPTO 1991. Springer-Verlag
    • C. Rackoff and D. R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In CRYPTO 1991, volume 576 of LNCS, pages 433-444. Springer-Verlag, 1991.
    • (1991) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 15
    • 33646850611 scopus 로고    scopus 로고
    • Weaknesses in two group Diffie-Hellman key exchange protocols
    • Q. Tang and L. Chen. Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols. Cryptology ePrint Archive: Report 2005/197, 2005.
    • (2005) Cryptology EPrint Archive: Report , vol.2005 , Issue.197
    • Tang, Q.1    Chen, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.