메뉴 건너뛰기




Volumn 110, Issue 4, 2010, Pages 160-167

A general compiler for password-authenticated group key exchange protocol

Author keywords

Cryptography; Group key exchange; Ideal cipher model; Password; Random oracle model

Indexed keywords

GROUP KEY EXCHANGE; IDEAL-CIPHER MODEL; NEW PROTOCOL; ORACLE MODEL; PASSWORD; PUBLIC NETWORKS; SESSION KEY;

EID: 72249122118     PISSN: 00200190     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ipl.2009.11.013     Document Type: Article
Times cited : (14)

References (26)
  • 1
    • 77649257689 scopus 로고    scopus 로고
    • A scalable password-based group key exchange protocol in the standard model
    • M. Abdalla, D. Pointcheval, A scalable password-based group key exchange protocol in the standard model, in: Advances in Cryptology - Asiacrypt'06, 2006, pp. 332-347
    • (2006) Advances in Cryptology - Asiacrypt'06 , pp. 332-347
    • Abdalla, M.1    Pointcheval, D.2
  • 3
    • 38049071438 scopus 로고    scopus 로고
    • (Password) Authenticated key establishment: From 2-party to group. Theory of cryptography conference - TCC 2007
    • Abdalla M., Bohli J.-M., Gonzalez Vasco M.I., and Steinwandt R. (Password) Authenticated key establishment: From 2-party to group. Theory of cryptography conference - TCC 2007. Lecture Notes in Computer Science vol. 4392 (2007) 499-514
    • (2007) Lecture Notes in Computer Science , vol.4392 , pp. 499-514
    • Abdalla, M.1    Bohli, J.-M.2    Gonzalez Vasco, M.I.3    Steinwandt, R.4
  • 4
    • 0032218234 scopus 로고    scopus 로고
    • G. Ateniese, M. Steiner, G. Tsudik, Authenticated group key agreement and friends, in: 5th ACM Conference on Computer and Communications Security, November 1998, pp. 17-26
    • G. Ateniese, M. Steiner, G. Tsudik, Authenticated group key agreement and friends, in: 5th ACM Conference on Computer and Communications Security, November 1998, pp. 17-26
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Eurocrypt'00, Springer-Verlag, Berlin
    • Bellare M., Pointcheval D., and Rogaway P. Authenticated key exchange secure against dictionary attacks. Eurocrypt'00. Lecture Notes in Computer Science vol. 1807 (2000), Springer-Verlag, Berlin 139-155
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 7
    • 50849127145 scopus 로고    scopus 로고
    • Provably authenticated group Diffie-Hellman key exchange - the dynamic case
    • December
    • E. Bresson, O. Chevassut, D. Pointcheval, Provably authenticated group Diffie-Hellman key exchange - the dynamic case, in: Advances in Cryptology - Crypto'01, December 2001, pp. 290-309
    • (2001) Advances in Cryptology - Crypto'01 , pp. 290-309
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 12
    • 84957893731 scopus 로고    scopus 로고
    • On key agreement conference key agreement
    • Australasian Conference on Information Security and Privacy - ACISP'97, Springer-Verlag, Berlin
    • Boyd C. On key agreement conference key agreement. Australasian Conference on Information Security and Privacy - ACISP'97. Lecture Notes in Computer Science vol. 1270 (1997), Springer-Verlag, Berlin 294-302
    • (1997) Lecture Notes in Computer Science , vol.1270 , pp. 294-302
    • Boyd, C.1
  • 13
    • 84948991087 scopus 로고
    • Efficient conference key distribution system
    • Proc. of Eurocrypt'94, Springer-Verlag
    • Burmester M., Desmedt Y., and Secure A. Efficient conference key distribution system. Proc. of Eurocrypt'94. Lecture Notes in Computer Science vol. 950 (1995), Springer-Verlag 275-286
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2    Secure, A.3
  • 14
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Proceedings of CRYPTO'98
    • Cramer R., and Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. Proceedings of CRYPTO'98. Lecture Notes in Computer Science vol. 1462 (1998) 13-25
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 19
    • 35248878854 scopus 로고    scopus 로고
    • in: Advances in Cryptology - Crypto'03, 2003, pp. 110-125. Full version available at
    • Katz J., and Yung M. Scalable protocols for authenticated group key exchange. in: Advances in Cryptology - Crypto'03, 2003, pp. 110-125. Full version available at. http://www.cs.umd.edu/~jkatz/papers.html
    • Scalable protocols for authenticated group key exchange
    • Katz, J.1    Yung, M.2
  • 20
    • 84955559079 scopus 로고    scopus 로고
    • Authenticated multi-party key agreement
    • Advances in Cryptology - Asiacrypt 1996, Springer-Verlag
    • Just M., and Vaudenay S. Authenticated multi-party key agreement. Advances in Cryptology - Asiacrypt 1996. Lecture Notes in Computer Science vol. 1163 (1996), Springer-Verlag 36-49
    • (1996) Lecture Notes in Computer Science , vol.1163 , pp. 36-49
    • Just, M.1    Vaudenay, S.2
  • 21
    • 35048828834 scopus 로고    scopus 로고
    • Efficient password-based group key exchange, Trust and privacy in digital business
    • S.-M. Lee, J.Y. Hwang, D.H. Lee, Efficient password-based group key exchange, Trust and privacy in digital business, in: 1st International Conference, 2004, pp. 191-199
    • (2004) 1st International Conference , pp. 191-199
    • Lee, S.-M.1    Hwang, J.Y.2    Lee, D.H.3
  • 22
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • M. Naor, M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attacks, in: STOC'90, 1990
    • (1990) STOC'90
    • Naor, M.1    Yung, M.2
  • 23
    • 0002360237 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Crypto'91
    • Rackoff C., and Simon D.R. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. Crypto'91. Lecture Notes in Computer Science vol. 576 (1991) 387-394
    • (1991) Lecture Notes in Computer Science , vol.576 , pp. 387-394
    • Rackoff, C.1    Simon, D.R.2
  • 24
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero knowledge and adaptive chosen ciphertext security
    • A. Sahai, Non-malleable non-interactive zero knowledge and adaptive chosen ciphertext security, in: FOCS'99, 1999, pp. 543-553
    • (1999) FOCS'99 , pp. 543-553
    • Sahai, A.1
  • 26
    • 84957807365 scopus 로고    scopus 로고
    • A practical and secure fault-tolerant conference-key agreement protocol
    • Proc. of PKC2000, Springer-Verlag
    • Tzeng W.-G. A practical and secure fault-tolerant conference-key agreement protocol. Proc. of PKC2000. Lecture Notes in Computer Science (2000), Springer-Verlag
    • (2000) Lecture Notes in Computer Science
    • Tzeng, W.-G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.