메뉴 건너뛰기




Volumn 4392 LNCS, Issue , 2007, Pages 479-498

Intrusion-resilient key exchange in the bounded retrieval model

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTATION THEORY; INFORMATION RETRIEVAL; MATHEMATICAL MODELS;

EID: 38049016824     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70936-7_26     Document Type: Conference Paper
Times cited : (47)

References (31)
  • 2
    • 79958074367 scopus 로고    scopus 로고
    • A forward-secure digital signature scheme
    • Mihir Bellare and Sara K. Miner. A forward-secure digital signature scheme. In CRYPTO, pages 431-448, 1999.
    • (1999) CRYPTO , pp. 431-448
    • Bellare, M.1    Miner, S.K.2
  • 3
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Mihir Bellare, David Pointcheval, and Phillip Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT, pages 139-155, 2000.
    • (2000) EUROCRYPT , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 4
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In CRYPTO, pages 232-249, 1993.
    • (1993) CRYPTO , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 33749228136 scopus 로고
    • Randomness-efficient oblivious sampling
    • Mihir Bellare and John Rompel. Randomness-efficient oblivious sampling. In FOCS, pages 276-287, 1994.
    • (1994) FOCS , pp. 276-287
    • Bellare, M.1    Rompel, J.2
  • 6
    • 35248891000 scopus 로고    scopus 로고
    • Forward-security in private-key cryptography
    • Mihir Bellare and Bennet S. Yee. Forward-security in private-key cryptography. In CT-RSA, pages 1-18, 2003.
    • (2003) CT-RSA , pp. 1-18
    • Bellare, M.1    Yee, B.S.2
  • 7
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • Steven M. Bellovin and Michael Merritt. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In ACM Conference on Computer and Communications Security, pages 244-250, 1993.
    • (1993) ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 8
    • 24944501364 scopus 로고    scopus 로고
    • Secure remote authentication using biometric data
    • Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, and Adam Smith. Secure remote authentication using biometric data. In EUROCRYPT, pages 147-163, 2005.
    • (2005) EUROCRYPT , pp. 147-163
    • Boyen, X.1    Dodis, Y.2    Katz, J.3    Ostrovsky, R.4    Smith, A.5
  • 9
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using diffie-hellman
    • Victor Boyko, Philip D. MacKenzie, and Sarvar Patel. Provably secure password-authenticated key exchange using diffie-hellman. In EUROCRYPT, pages 156-171, 2000.
    • (2000) EUROCRYPT , pp. 156-171
    • Boyko, V.1    MacKenzie, P.D.2    Patel, S.3
  • 10
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Ran Canetti. Universally composable security: A new paradigm for cryptographic protocols. In FOCS, pages 136-145, 2001.
    • (2001) FOCS , pp. 136-145
    • Canetti, R.1
  • 11
    • 84948973494 scopus 로고    scopus 로고
    • Exposure-resilient functions and all-or-nothing transforms
    • Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, and Amit Sahai. Exposure-resilient functions and all-or-nothing transforms. In EUROCRYPT, pages 453-469, 2000.
    • (2000) EUROCRYPT , pp. 453-469
    • Canetti, R.1    Dodis, Y.2    Halevi, S.3    Kushilevitz, E.4    Sahai, A.5
  • 12
    • 35048875340 scopus 로고    scopus 로고
    • On the random-oracle methodology as applied to length-restricted signature schemes
    • Ran Canetti, Oded Goldreich, and Shai Halevi. On the random-oracle methodology as applied to length-restricted signature schemes. In TCC, pages 40-57, 2004.
    • (2004) TCC , pp. 40-57
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 13
    • 35248897599 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • Ran Canetti, Shai Halevi, and Jonathan Katz. A forward-secure public-key encryption scheme. In EUROCRYPT, pages 255-271, 2003.
    • (2003) EUROCRYPT , pp. 255-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 14
    • 24944566824 scopus 로고    scopus 로고
    • Universally composable password-based key exchange
    • Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, and Philip D. MacKenzie. Universally composable password-based key exchange. In EUROCRYPT, pages 404-421, 2005.
    • (2005) EUROCRYPT , pp. 404-421
    • Canetti, R.1    Halevi, S.2    Katz, J.3    Lindell, Y.4    MacKenzie, P.D.5
  • 15
    • 33745629609 scopus 로고    scopus 로고
    • Giovanni Di Crescenzo, Richard J. Lipton, and Shabsi Walfish. Perfectly secure password protocols in the bounded retrieval model. In TCC, pages 225-244, 2006.
    • Giovanni Di Crescenzo, Richard J. Lipton, and Shabsi Walfish. Perfectly secure password protocols in the bounded retrieval model. In TCC, pages 225-244, 2006.
  • 16
    • 26444473627 scopus 로고    scopus 로고
    • Protecting secret data from insider attacks
    • David Dagon, Wenke Lee, and Richard J. Lipton. Protecting secret data from insider attacks. In Financial Cryptography, pages 16-30, 2005.
    • (2005) Financial Cryptography , pp. 16-30
    • Dagon, D.1    Lee, W.2    Lipton, R.J.3
  • 17
    • 35248884707 scopus 로고    scopus 로고
    • Intrusion-resilient public-key encryption
    • Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, and Moti Yung. Intrusion-resilient public-key encryption. In CT-RSA, pages 19-32, 2003.
    • (2003) CT-RSA , pp. 19-32
    • Dodis, Y.1    Franklin, M.K.2    Katz, J.3    Miyaji, A.4    Yung, M.5
  • 18
    • 33749541274 scopus 로고    scopus 로고
    • Robust fuzzy extractors and authenticated key agreement from close secrets
    • Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, and Adam Smith. Robust fuzzy extractors and authenticated key agreement from close secrets. In CRYPTO, pages 232-250, 2006.
    • (2006) CRYPTO , pp. 232-250
    • Dodis, Y.1    Katz, J.2    Reyzin, L.3    Smith, A.4
  • 19
    • 84947254092 scopus 로고    scopus 로고
    • Key-insulated public key cryptosystems
    • Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, and Moti Yung. Key-insulated public key cryptosystems. In EUROCRYPT, pages 65-82, 2002.
    • (2002) EUROCRYPT , pp. 65-82
    • Dodis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 20
    • 35248813300 scopus 로고    scopus 로고
    • Strong key-insulated signature schemes
    • Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, and Moti Yung. Strong key-insulated signature schemes. In Public Key Cryptography, pages 130-144, 2003.
    • (2003) Public Key Cryptography , pp. 130-144
    • Dodis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 21
    • 36348947793 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Cryptology ePrint Archive
    • Report 2003/235
    • Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Cryptology ePrint Archive, Report 2003/235, 2006. http://eprint.iacr.org/.
    • (2006)
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 22
    • 33745532541 scopus 로고    scopus 로고
    • Intrusion-resilience via the bounded-storage model
    • Stefan Dziembowski. Intrusion-resilience via the bounded-storage model. In TCC, pages 207-224, 2006.
    • (2006) TCC , pp. 207-224
    • Dziembowski, S.1
  • 23
    • 33749583877 scopus 로고    scopus 로고
    • On forward-secure storage
    • Stefan Dziembowski. On forward-secure storage. In CRYPTO, pages 251-270, 2006.
    • (2006) CRYPTO , pp. 251-270
    • Dziembowski, S.1
  • 24
    • 84880888233 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • Oded Goldreich and Yehuda Lindell. Session-key generation using human passwords only. In CRYPTO, pages 408-432, 2001.
    • (2001) CRYPTO , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 25
    • 84937422774 scopus 로고    scopus 로고
    • Sibir: Signer-base intrusion-resilient signatures
    • Moti Yung, editor, CRYPTO, of, Springer
    • Gene Itkis and Leonid Reyzin. Sibir: Signer-base intrusion-resilient signatures. In Moti Yung, editor, CRYPTO, volume 2442 of Lecture Notes in Computer Science, pages 499-514. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 499-514
    • Itkis, G.1    Reyzin, L.2
  • 26
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53-66, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 27
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels iii: Privacy amplification
    • Ueli Maurer and Stefan Wolf. Secret-key agreement over unauthenticated public channels iii: Privacy amplification. IEEE Transactions on Information Theory, 49(4):839-851, 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.1    Wolf, S.2
  • 29
    • 35048874991 scopus 로고    scopus 로고
    • Unconditional authenticity and privacy from an arbitrarily weak secret
    • Renato Renner and Stefan Wolf. Unconditional authenticity and privacy from an arbitrarily weak secret. In CRYPTO, pages 78-95, 2003.
    • (2003) CRYPTO , pp. 78-95
    • Renner, R.1    Wolf, S.2
  • 30
    • 4344628859 scopus 로고    scopus 로고
    • Constructing locally computable extractors and cryptosystems in the bounded storage model
    • Salil P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded storage model. Journal of Cryptology, 17(1):43-77, 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 43-77
    • Vadhan, S.P.1
  • 31
    • 84947780088 scopus 로고    scopus 로고
    • Strong security against active attacks in information-theoretic secret-key agreement
    • Stefan Wolf. Strong security against active attacks in information-theoretic secret-key agreement. In ASIACRYPT, pages 405-419, 1998.
    • (1998) ASIACRYPT , pp. 405-419
    • Wolf, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.