메뉴 건너뛰기




Volumn 7, Issue 3, 2008, Pages 335-341

Proof of forward security for password-based authenticated key exchange

Author keywords

Key exchange; Password; Security proof

Indexed keywords

ACTIVE ATTACK; AUTHENTICATED KEY EXCHANGE; DIFFIE-HELLMAN ASSUMPTION; FORWARD SECURITY; FORWARD-SECURE; KEY EXCHANGE; PASSWORD; SECURITY PROOFS;

EID: 71649086263     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (12)
  • 1
    • 84937579774 scopus 로고    scopus 로고
    • The oracle Diffie-Hellman assumptions and an analysis of DHIES
    • Springer-Verlag
    • M. Abdalla, M. Bellare, and P. Rogaway, "The oracle Diffie-Hellman assumptions and an analysis of DHIES," CT-RSA '01, LNCS 2020, pp. 143-158, Springer-Verlag, 2001.
    • (2001) CT-RSA '01, LNCS 2020 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 3
    • 24144444566 scopus 로고    scopus 로고
    • One-time verifier-based encrypted key exchange
    • Springer-Verlag
    • M. Abdalla, O. Chevassut, and D. Pointcheval, "One-time verifier-based encrypted key exchange," PKC '05, LNCS 3386, pp. 47-64, Springer-Verlag,2005.
    • (2005) PKC '05, LNCS 3386 , pp. 47-64
    • Abdalla, M.1    Chevassut, O.2    Pointcheval, D.3
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks," Eurocrypt '00, LNCS 1807
    • M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," Eurocrypt '00, LNCS 1807, pp. 139-155, Springer-Verlag, 2000.
    • (2000) Springer-Verlag , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 0004304523 scopus 로고    scopus 로고
    • The AuthA Protocol for Password-Based Authenticated Key Exchange, Technical Report
    • M. Bellare, and P. Rogaway, The AuthA Protocol for Password-Based Authenticated Key Exchange, Technical Report, IEEE P1363, Mar. 2000.
    • (2000) IEEE P1363 , Issue.MAR
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • S. M. Bellovin, and M. Merritt, "Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise," Proceedings of the 1st ACM Conference on CCS, pp. 244-250, 1993.
    • (1993) Proceedings of the 1st ACM Conference on CCS , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 9
    • 35048866891 scopus 로고    scopus 로고
    • New security results on encrypted key exchange," PKC'04, LNCS 2947
    • E. Bresson, O. Chevassut, and D. Pointcheval,"New security results on encrypted key exchange," PKC'04, LNCS 2947, pp. 145-158, Springer-Verlag, 2004.
    • (2004) Springer-Verlag , pp. 145-158
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 10
    • 84874979610 scopus 로고    scopus 로고
    • Security weakness in a three-party passwordbased key exchange protocol using weil pairing
    • N. Junghyun, K. Seungjoo, and W. Dongho, "Security weakness in a three-party passwordbased key exchange protocol using weil pairing," Cryptology ePrint Archive Report, 2005, http://eprint.iacr.org/2005/269.ps.
    • (2005) Cryptology ePrint Archive Report
    • Junghyun, N.1    Seungjoo, K.2    Dongho, W.3
  • 11
    • 33846461562 scopus 로고    scopus 로고
    • The PAK Suite: Protocols for Password-Authenticated Key Exchange
    • P. D. MacKenzie, The PAK Suite: Protocols for Password-Authenticated Key Exchange, IEEE P1363.2, Oct. 2002.
    • (2002) IEEE P1363.2 , Issue.OCT
    • MacKenzie, P.D.1
  • 12
    • 84937389342 scopus 로고    scopus 로고
    • The Gapproblems: A new class of problems for the security of cryptographic schemes
    • Springer-Verlag, PKC '01, LNCS 1992
    • T. Okamoto, and D. Pointcheval, "The Gapproblems: A new class of problems for the security of cryptographic schemes," PKC '01, LNCS 1992, pp. 104-118, Springer-Verlag, 2001
    • (2001) , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.