메뉴 건너뛰기




Volumn E91-A, Issue 11, 2008, Pages 3312-3324

A secure construction for threshold anonymous password-authenticated key exchange

Author keywords

Anonymity; Key exchange; PAKE; Password authentication; Provable security

Indexed keywords

SEMANTICS;

EID: 77950803004     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1093/ietfec/e91-a.11.3312     Document Type: Article
Times cited : (7)

References (23)
  • 1
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols
    • Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
    • M. Abdalla and D. Pointcheval, "Simple password-based encrypted key exchange protocols," Proc. CT-RSA 2005, LNCS 3376, pp.191- 208, Springer-Verlag, 2005. (Pubitemid 41231212)
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 191-208
    • Abdalla, M.1    Pointcheval, D.2
  • 3
  • 4
    • 0026850091 scopus 로고
    • Encrypted key exchange: Passwordbased protocols secure against dictionary attacks
    • S.M. Bellovin and M. Merritt, "Encrypted key exchange: Passwordbased protocols secure against dictionary attacks," Proc. IEEE Symposium on Security and Privacy, pp.72-84, 1992.
    • (1992) Proc. IEEE Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," Proc. EUROCRYPT 2000, LNCS 1807, pp.139-155, Springer-Verlag, 2000.
    • (2000) Proc. EUROCRYPT 2000, LNCS 1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," Proc. ACM CCS'93, pp.62-73, 1993.
    • (1993) Proc. ACM CCS'93 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Springer-Verlag
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution," Proc. CRYPTO'93, LNCS 773, pp.232-249, Springer-Verlag, 1993.
    • (1993) Proc. CRYPTO'93, LNCS 773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 24144485861 scopus 로고    scopus 로고
    • Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries
    • Springer-Verlag
    • C.K. Chu and W.G. Tzeng, "Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries," Proc. PKC 2005, LNCS 3386, pp.172-183, Springer-Verlag, 2005.
    • Proc. PKC 2005, LNCS 3386 , vol.2005 , pp. 172-183
    • Chu, C.K.1    Tzeng, W.G.2
  • 9
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.IT-22, no.6, pp.644-654, 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 11
    • 85027123886 scopus 로고    scopus 로고
    • http://grouper.ieee.org/groups/1363/passwdPK/submissions.htm
  • 12
    • 35248816546 scopus 로고    scopus 로고
    • SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols
    • Springer-Verlag
    • H. Krawczyk, "SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols," Proc. CRYPTO 2003, LNCS 2729, pp.400-425, Springer-Verlag, 2003.
    • (2003) Proc. CRYPTO 2003, LNCS 2729 , pp. 400-425
    • Krawczyk, H.1
  • 14
    • 24144502325 scopus 로고    scopus 로고
    • The relationship between password-authenticated key exchange and other cryptographic primitives
    • Springer-Verlag
    • M.H. Nguyen, "The relationship between password-authenticated key exchange and other cryptographic primitives," Proc. TCC 2005, LNCS 3378, pp.457-475, Springer-Verlag, 2005.
    • (2005) Proc. TCC 2005, LNCS 3378 , pp. 457-475
    • Nguyen, M.H.1
  • 15
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Proc. Commun. ACM, vol.22, no.11, pp.612-613, 1979.
    • (1979) Proc. Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 16
    • 0004023090 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • Available at
    • V. Shoup, "On formal models for secure key exchange," IBM Research Report RZ 3121, 1999. Available at http://eprint.iacr.org/ 1999/012
    • (1999) IBM Research Report RZ 3121
    • Shoup, V.1
  • 17
    • 1642489925 scopus 로고    scopus 로고
    • OAEP reconsidered
    • Sept
    • V. Shoup, "OAEP reconsidered," J. Cryptol., vol.15, no.4, pp.223- 249, Sept. 2002.
    • (2002) J. Cryptol. , vol.15 , Issue.4 , pp. 223-249
    • Shoup, V.1
  • 18
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • V. Shoup, "Sequences of games: A tool for taming complexity in security proofs," Cryptology ePrint Archive: Report 2004/332, http://eprint.iacr.org/2004/332
    • Cryptology ePrint Archive: Report 2004/332
    • Shoup, V.1
  • 19
    • 38149091550 scopus 로고    scopus 로고
    • A secure threshold anonymous password-authenticated key exchange protocol
    • Springer-Verlag
    • S.H. Shin, K. Kobara, and H. Imai, "A secure threshold anonymous password-authenticated key exchange protocol," Proc. IWSEC 2007, LNCS 4752, pp.444-458, Springer-Verlag, 2007.
    • Proc. IWSEC 2007, LNCS 4752 , vol.2007 , pp. 444-458
    • Shin, S.H.1    Kobara, K.2    Imai, H.3
  • 20
    • 84958985031 scopus 로고    scopus 로고
    • Efficient 1-out-n oblivious transfer schemes
    • Springer-Verlag
    • W.G. Tzeng, "Efficient 1-out-n oblivious transfer schemes," Proc. PKC 2002, LNCS 2274, pp.159-171, Springer-Verlag, 2002.
    • Proc. PKC 2002, LNCS 2274 , vol.2002 , pp. 159-171
    • Tzeng, W.G.1
  • 21
    • 33646844820 scopus 로고    scopus 로고
    • Anonymous passwordbased authenticated key exchange
    • Springer-Verlag
    • D.Q. Viet, A. Yamamura, and H. Tanaka, "Anonymous passwordbased authenticated key exchange," Proc. INDOCRYPT 2005, LNCS 3797, pp.244-257, Springer-Verlag, 2005.
    • Proc. INDOCRYPT 2005, LNCS 3797 , vol.2005 , pp. 244-257
    • Viet, D.Q.1    Yamamura, A.2    Tanaka, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.