메뉴 건너뛰기




Volumn 4329 LNCS, Issue , 2006, Pages 104-117

Cryptanalysis of two provably secure cross-realm C2C-pake protocols

Author keywords

Client to client; Cross realm; Cryptanalysis; Password authenticated key exchange; Provable security; Security model

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY;

EID: 37549042706     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11941378_9     Document Type: Conference Paper
Times cited : (27)

References (29)
  • 1
    • 0003515822 scopus 로고    scopus 로고
    • Explicit Communication Revisited: Two New Attacks on Authentication Protocols
    • M. Abadi. Explicit Communication Revisited: Two New Attacks on Authentication Protocols. IEEE Transactions on Software Engineering, Vol. 23, No. 3, pp. 185-186, 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.3 , pp. 185-186
    • Abadi, M.1
  • 2
    • 24144491593 scopus 로고    scopus 로고
    • Password-Based Authenticated Key Exchange in the Three-Party Setting
    • M. Abdalla, P.-A. Fouque, and D. Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting. Proc. PKC ’05, LNCS 3386, pp. 65-84, 2005.
    • (2005) Proc. PKC ’05, LNCS 3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 3
    • 26444476977 scopus 로고    scopus 로고
    • Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
    • M. Abdalla and D. Pointcheval. Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Proc. FC ’05, LNCS 3570, pp. 341-356, 2005.
    • (2005) Proc. FC ’05, LNCS 3570 , pp. 341-356
    • Abdalla, M.1    Pointcheval, D.2
  • 4
    • 72949109453 scopus 로고    scopus 로고
    • Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
    • available online at
    • M. Abdalla and D. Pointcheval. Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Full version of [3], available online at http://www.di.ens.fr/∼pointche/pub.php?reference=AbPo05.
    • Full Version of [3]
    • Abdalla, M.1    Pointcheval, D.2
  • 5
    • 0003605208 scopus 로고    scopus 로고
    • Security Engineering − A Guide to Building Dependable Distributed Systems
    • Wiley, USA
    • R. Anderson. Security Engineering − A Guide to Building Dependable Distributed Systems. Wiley, USA, 2001.
    • (2001)
    • Anderson, R.1
  • 7
    • 0001940580 scopus 로고
    • Provably Secure Session Key Distribution: The Three Party Case
    • M. Bellare and P. Rogaway. Provably Secure Session Key Distribution: the Three Party Case. Proc. ACM STOC ’95, pp. 57–66, 1995.
    • (1995) Proc. ACM STOC ’95 , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 0026850091 scopus 로고
    • Encrypted Key Exchange: Passwords based Protocols Secure against Dictionary Attacks
    • S. Bellovin and M. Merritt. Encrypted Key Exchange: Passwords based Protocols Secure against Dictionary Attacks. Proc. IEEE Symposium on Security & Privacy ’92, pp. 72-84, 1992.
    • (1992) Proc. IEEE Symposium on Security & Privacy ’92 , pp. 72-84
    • Bellovin, S.1    Merritt, M.2
  • 10
    • 84944063128 scopus 로고    scopus 로고
    • Password-Authenticated Key Exchange between Clients with Different Passwords
    • J.W. Byun, I.R. Jeong, D.H. Lee, and C.S. Park. Password-Authenticated Key Exchange between Clients with Different Passwords. Proc. ICICS ’02, LNCS 2513, pp. 134-146, 2002.
    • (2002) ICICS ’02, LNCS 2513 , pp. 134-146
    • Byun, J.W.1    Jeong, I.R.2    Lee, D.H.3    Parkproc, C.S.4
  • 11
    • 26444523527 scopus 로고    scopus 로고
    • N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
    • J.W. Byun and D.H. Lee. N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Proc. ACNS ’05, LNCS 3531, pp. 75-90, 2005.
    • (2005) ACNS ’05, LNCS 3531 , pp. 75-90
    • Byun, J.W.1    Leeproc, D.H.2
  • 12
    • 33745677007 scopus 로고    scopus 로고
    • Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol
    • J.W. Byun, D.H. Lee, and J. Lim. Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. Proc. APWeb ’06, LNCS 3841, pp. 830-836, 2006.
    • (2006) Proc. Apweb ’06, LNCS 3841 , pp. 830-836
    • Byun, J.W.1    Lee, D.H.2    Lim, J.3
  • 13
    • 26444541830 scopus 로고    scopus 로고
    • A Weakness of the Password-Authenticated Key Agreement between Clients with Different Passwords Scheme
    • ISO/IEC JTC 1/SC27 N3716, 2003-10-20.24
    • L. Chen. A Weakness of the Password-Authenticated Key Agreement between Clients with Different Passwords Scheme. Circulated for consideration at the 27th SC27/WG2 meeting in Paris, France, ISO/IEC JTC 1/SC27 N3716, 2003-10-20.24, 2003.
    • (2003) Circulated for Consideration at the 27Th SC27/WG2 Meeting in Paris, France
    • Chen, L.1
  • 14
    • 33646805409 scopus 로고    scopus 로고
    • Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
    • Advances in Cryptology - Asiacrypt ’05
    • K.-K.R. Choo, C. Boyd, and Y. Hitchcock. Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. Advances in Cryptology - Asiacrypt ’05, LNCS 3788, pp. 585-604, 2005.
    • (2005) LNCS , vol.3788 , pp. 585-604
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 18
    • 0002805220 scopus 로고
    • Undetectable On-line Password Guessing Attacks
    • Y. Ding and P. Horster. Undetectable On-line Password Guessing Attacks. ACM Operating Systems Review, Vol. 29, No. 4, pp. 77-86, 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 20
    • 67649746889 scopus 로고    scopus 로고
    • An Unknown Key-Share Attack on the MQV Key Agreement Protocol
    • B.S. Kaliski Jr. An Unknown Key-Share Attack on the MQV Key Agreement Protocol. ACM TISSEC, Vol. 4, No. 3, pp. 275-288, 2001.
    • (2001) ACM TISSEC , vol.4 , Issue.3 , pp. 275-288
    • Kaliski, B.S.1
  • 21
    • 35048820669 scopus 로고    scopus 로고
    • On the Integration of Watermarks and Cryptography
    • S. Katzenbeisser. On the Integration of Watermarks and Cryptography. Proc. IWDW ’03, LNCS 2939, pp. 50-60, 2003.
    • (2003) Proc. IWDW ’03, LNCS 2939 , pp. 50-60
    • Katzenbeisser, S.1
  • 22
    • 35048854202 scopus 로고    scopus 로고
    • Cryptanalysis and Improvement of Password-Authenticated Key Exchange Scheme between Clients with Different Passwords
    • J. Kim, S. Kim, J. Kwak, and D. Won. Cryptanalysis and Improvement of Password-Authenticated Key Exchange Scheme between Clients with Different Passwords. Proc. ICCSA ’04, LNCS 3043, pp. 895-902, 2004.
    • (2004) Proc. ICCSA ’04, LNCS 3043 , pp. 895-902
    • Kim, J.1    Kim, S.2    Kwak, J.3    Won, D.4
  • 23
    • 33646720921 scopus 로고    scopus 로고
    • ID-based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment
    • S. Kim, H. Lee and H. Oh. Enhanced ID-based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment. Proc. ICICS ’05, LNCS 3783, pp. 323-336, 2005.
    • (2005) Proc. ICICS ’05, LNCS 3783 , pp. 323-336
    • Kim, S.1    Lee, H.2    Enhanced, H.O.3
  • 24
    • 26444613363 scopus 로고    scopus 로고
    • Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme
    • R.C.-W. Phan and B.-M. Goi. Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. Proc. ACNS ’05, LNCS 3531, pp. 33-39, 2005.
    • (2005) Proc. ACNS ’05, LNCS 3531 , pp. 33-39
    • Phan, R.C.-W.1    Goi, B.-M.2
  • 25
    • 33746600612 scopus 로고    scopus 로고
    • Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
    • R.C.-W. Phan and B.-M. Goi. Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Proc. ACNS ’06, LNCS 3989, pp. 226-238, 2006.
    • (2006) Proc. ACNS ’06, LNCS 3989 , pp. 226-238
    • Phan, R.C.-W.1    Goi, B.-M.2
  • 26
    • 35248867842 scopus 로고    scopus 로고
    • Why Provable Security Matters? Advances in Cryptology - Eurocrypt ’03, LNCS 2656
    • J. Stern. Why Provable Security Matters? Advances in Cryptology - Eurocrypt ’03, LNCS 2656, pp. 449-461, 2003.
    • (2003) , pp. 449-461
    • Stern, J.1
  • 27
    • 35048872322 scopus 로고    scopus 로고
    • Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords
    • S. Wang, J. Wang, and M. Xu. Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. Proc. ACNS ’04, LNCS 3089, pp. 414-425, 2004.
    • (2004) Proc. ACNS ’04, LNCS 3089 , pp. 414-425
    • Wang, S.1    Wang, J.2    Xu, M.3
  • 28
    • 33746374068 scopus 로고    scopus 로고
    • Secure Cross-Realm C2C-PAKE Protocol
    • Y. Yin and L. Bao. Secure Cross-Realm C2C-PAKE Protocol. Proc. ACISP ’06, LNCS 4058, pp. 395-406, 2006.
    • (2006) Proc. ACISP ’06, LNCS 4058 , pp. 395-406
    • Yin, Y.1    Bao, L.2
  • 29
    • 33646746196 scopus 로고    scopus 로고
    • Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity
    • E.-J. Yoon and K.-Y. Yoo. Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. Proc. ICICS ’05, LNCS 3783, pp. 315-322, 2005.
    • (2005) Proc. ICICS ’05, LNCS 3783 , pp. 315-322
    • Yoon, E.-J.1    Yoo, K.-Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.