메뉴 건너뛰기




Volumn 4752 LNCS, Issue , 2007, Pages 444-458

A secure threshold anonymous password-authenticated key exchange protocol

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; BANDWIDTH; COMMUNICATION SYSTEMS; COMPUTATIONAL COMPLEXITY; GLOSSARIES; SERVERS;

EID: 38149091550     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75651-4_30     Document Type: Conference Paper
Times cited : (17)

References (22)
  • 1
    • 24144443144 scopus 로고    scopus 로고
    • Abdalla, M., Pointcheval, D.: Simple Password-Based Encrypted Key Exchange Protocols. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, 3376, pp. 191-208. Springer, Heidelberg (2005)
    • Abdalla, M., Pointcheval, D.: Simple Password-Based Encrypted Key Exchange Protocols. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 191-208. Springer, Heidelberg (2005)
  • 2
    • 0031642585 scopus 로고    scopus 로고
    • A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
    • ACM Press, New York
    • Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: Proc. of 30th ACM Symposium on Theory of Computing (STOC), pp. 419-428. ACM Press, New York (1998)
    • (1998) Proc. of 30th ACM Symposium on Theory of Computing (STOC) , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 3
    • 35048866891 scopus 로고    scopus 로고
    • Bresson, E., Chevassut, O., Pointcheval, D.: New Security Results on Encrypted Key Exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, 2947, pp. 145-158. Springer, Heidelberg (2004)
    • Bresson, E., Chevassut, O., Pointcheval, D.: New Security Results on Encrypted Key Exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 145-158. Springer, Heidelberg (2004)
  • 4
    • 0026850091 scopus 로고
    • Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks
    • Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks. In: Proc. of IEEE Symposium on Security and Privacy, pp. 72-84 (1992)
    • (1992) Proc. of IEEE Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure against Dictionary Attacks
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 0027726717 scopus 로고
    • Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
    • Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: Proc. of ACM CCS 1993, pp. 62-73 (1993)
    • (1993) Proc. of ACM , vol.CCS 1993 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 24144485861 scopus 로고    scopus 로고
    • Chu, C.K., Tzeng, W.G.: Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 172-183. Springer, Heidelberg (2005)
    • Chu, C.K., Tzeng, W.G.: Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 172-183. Springer, Heidelberg (2005)
  • 11
    • 38149116508 scopus 로고    scopus 로고
    • http://grouper.ieee.org/groups/1363/passwdPK/submissions.html
  • 12
    • 35248816546 scopus 로고    scopus 로고
    • SIGMA: The 'SIGn-and-MAc' Approach to Authenticated DiffieHellman and its Use in the IKE Protocols
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Krawczyk, H.: SIGMA: the 'SIGn-and-MAc' Approach to Authenticated DiffieHellman and its Use in the IKE Protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400-425. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 400-425
    • Krawczyk, H.1
  • 13
    • 84937438236 scopus 로고    scopus 로고
    • Threshold Password-Authenticated Key Exchange
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • MacKenzie, P., Shrimpton, T., Jakobsson, M.: Threshold Password-Authenticated Key Exchange. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 385-400. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 385-400
    • MacKenzie, P.1    Shrimpton, T.2    Jakobsson, M.3
  • 14
    • 24144502325 scopus 로고    scopus 로고
    • Nguyen, M.H.: The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 457-475. Springer, Heidelberg (2005)
    • Nguyen, M.H.: The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 457-475. Springer, Heidelberg (2005)
  • 16
    • 3042666549 scopus 로고    scopus 로고
    • On Formal Models for Secure Key Exchange
    • 3121, Available at
    • Shoup, V.: On Formal Models for Secure Key Exchange. IBM Research Report RZ 3121, (1999) Available at http://eprint.iacr.org/1999/012
    • (1999) IBM Research Report RZ
    • Shoup, V.1
  • 17
    • 1642489925 scopus 로고    scopus 로고
    • Shoup, V.: OAEP Reconsidered. Journal of Cryptology 15(4), 223-249 (2002)
    • Shoup, V.: OAEP Reconsidered. Journal of Cryptology 15(4), 223-249 (2002)
  • 18
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of Games: A Tool for Taming Complexity in Security Proofs. Cryptology ePrint Archive
    • Report 2004 /332, Available at
    • Shoup, V.: Sequences of Games: A Tool for Taming Complexity in Security Proofs. Cryptology ePrint Archive: Report 2004 /332, Available at http://eprint.iacr.org/2004/332
    • Shoup, V.1
  • 19
    • 84958985031 scopus 로고    scopus 로고
    • Tzeng, W.G.: Efficient 1-Out-n Oblivious Transfer Schemes. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, 2274, pp. 159-171. Springer, Heidelberg (2002)
    • Tzeng, W.G.: Efficient 1-Out-n Oblivious Transfer Schemes. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 159-171. Springer, Heidelberg (2002)
  • 20
    • 33646844820 scopus 로고    scopus 로고
    • Anonymous Password-Based Authenticated Key Exchange
    • Maitra, S, Madhavan, C.E.V, Venkatesan, R, eds, INDOCRYPT 2005, Springer, Heidelberg
    • Viet, D.Q., Yamamura, A., Tanaka, H.: Anonymous Password-Based Authenticated Key Exchange. In: Maitra, S., Madhavan, C.E.V., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 244-257. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3797 , pp. 244-257
    • Viet, D.Q.1    Yamamura, A.2    Tanaka, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.