메뉴 건너뛰기




Volumn , Issue , 2009, Pages 228-238

Hidden credential retrieval from a reusable password

Author keywords

Online authentication; Partially trusted servers; Reusable passwords; Stateless roaming credentials

Indexed keywords

BLIND SIGNATURES; COMPREHENSIVE MODEL; HIDDEN CREDENTIALS; LIMITED MEMORY; OFFLINE; OFFLINE PASSWORDS; ONLINE AUTHENTICATION; ORACLE MODEL; PLAINTEXT; SIMPLE PROTOCOL; SINGLE SIGN ON; USER-CENTRIC;

EID: 77952372954     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1533057.1533089     Document Type: Conference Paper
Times cited : (32)

References (46)
  • 2
    • 85032877753 scopus 로고
    • Non-interactive oblivious transfer and applications
    • pages
    • Mihir Bellare and Silvio Micali. Non-interactive oblivious transfer and applications. In Advances in Cryptology-CRYPTO 1989, pages 547-57, 1989.
    • (1989) Advances in Cryptology-CRYPTO 1989 , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 4
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • pages
    • Steven M. Bellovin and Michael Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In IEEE Symposium on Security and Privacy-SP 1992, pages 72-84, 1992.
    • (1992) IEEE Symposium on Security and Privacy-SP 1992 , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 7
    • 34547358080 scopus 로고    scopus 로고
    • Advances in elliptic curve cryptography
    • Ian F. Blake, Gadiel Seroussi, and Nigel P. Smart, editors, of, Cambridge University Press
    • Ian F. Blake, Gadiel Seroussi, and Nigel P. Smart, editors. Advances in Elliptic Curve Cryptography, volume 317 of London Mathematical Society Lecture Note Series. Cambridge University Press, 2005.
    • (2005) London Mathematical Society Lecture Note Series , vol.317
  • 9
    • 35248880074 scopus 로고    scopus 로고
    • Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme
    • pages
    • Alexandra Boldyreva. Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In Public Key Cryptography-PKC 2003, pages 31-46, 2003.
    • (2003) Public Key Cryptography-PKC 2003 , pp. 31-46
    • Boldyreva, A.1
  • 12
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Advances in Cryptology - ASIACRYPT 2001
    • Dan Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the Weil pairing. In Advances in Cryptology-ASIACRYPT 2001, pages 514-32, 2001. (Pubitemid 33371204)
    • (2002) LECTURE NOTES in COMPUTER SCIENCE , Issue.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 13
    • 85071440512 scopus 로고    scopus 로고
    • Halting password puzzles - Hard-to-break encryption from human-memorable keys
    • pages, The USENIX Association
    • Xavier Boyen. Halting password puzzles - hard-to-break encryption from human-memorable keys. In 16th USENIX Security Symposium-SECURITY 2007, pages 119-134. The USENIX Association, 2007.
    • (2007) 16th USENIX Security Symposium-SECURITY 2007 , pp. 119-134
    • Boyen, X.1
  • 15
  • 17
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • and, In, pages
    • Christian Cachin, Silvio Micali, and Michael Stadler. Computationally private information retrieval with polylogarithmic communication. In Advances in Cryptology-EUROCRYPT 1999, pages 402-14, 1999.
    • (1999) Advances in Cryptology-EUROCRYPT 1999 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 20
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • pages
    • Ran Canetti and Hugo Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology-EUROCRYPT 2001, pages 453-74, 2001.
    • (2001) Advances in Cryptology-EUROCRYPT 2001 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 21
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • pages 199-203
    • David Chaum. Blind signatures for untraceable payments. In Advances in Cryptology-CRYPTO 1982, pages 199-203, 1982.
    • (1982) Advances in Cryptology-CRYPTO 1982
    • Chaum, D.1
  • 25
    • 39049162527 scopus 로고    scopus 로고
    • Klassp: Entering passwords on a spyware infected machine using a shared-secret proxy
    • D. Florencio and Cormac Herley. Klassp: Entering passwords on a spyware infected machine using a shared-secret proxy. In Proc. ACSAC 2006, 2006.
    • (2006) Proc. ACSAC 2006
    • Florencio, D.1    Herley, C.2
  • 29
    • 33749542277 scopus 로고    scopus 로고
    • A method for making password-based key exchange resilient to server compromise
    • and, In, LNCS, pages, Springer-Verlag
    • Craig Gentry, Philip MacKenzie, and Zulfikar Ramzan. A method for making password-based key exchange resilient to server compromise. In Advances in Cryptology-CRYPTO 2006, LNCS, pages 142-59. Springer-Verlag, 2006.
    • (2006) Advances in Cryptology-CRYPTO 2006 , pp. 142-159
    • Gentry, C.1    MacKenzie, P.2    Ramzan, Z.3
  • 30
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • and, In, pages
    • Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In ACM Symposium on Theory of Computing-STOC 1987, pages 218-29, 1987.
    • (1987) ACM Symposium on Theory of Computing-STOC 1987 , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 32
    • 73849106067 scopus 로고    scopus 로고
    • Smooth projective hashing and two-message oblivious transfer
    • Report 2007/118
    • Shai Halevi and Yael Tauman Kalai. Smooth projective hashing and two-message oblivious transfer. Cryptology ePrint Archive, Report 2007/118, 2007.
    • (2007) Cryptology EPrint Archive
    • Halevi, S.1    Kalai, Y.T.2
  • 35
  • 36
    • 23044527599 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • and, In
    • Jonathan Katz, Rafail Ostrovsky, and Moti Yung. Efficient password-authenticated key exchange using human-memorable passwords. In Advances in Cryptology-CRYPTO 2001, 2001.
    • (2001) Advances in Cryptology-CRYPTO 2001
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 38
    • 1942420748 scopus 로고    scopus 로고
    • Oblivious keyword search
    • Kaoru Kurosawa and W. Ogata. Oblivious keyword search. Journal of Complexity, 20 (2-3):356-71, 2004.
    • (2004) Journal of Complexity , vol.20 , Issue.2-3 , pp. 356-371
    • Kurosawa, K.1    Ogata, W.2
  • 39
    • 26444579536 scopus 로고    scopus 로고
    • An oblivious transfer protocol with log-squared communication
    • Report 2004/063
    • Helger Lipmaa. An oblivious transfer protocol with log-squared communication. Cryptology ePrint Archive, Report 2004/063, 2004.
    • (2004) Cryptology EPrint Archive
    • Lipmaa, H.1
  • 40
  • 42
    • 77952369980 scopus 로고    scopus 로고
    • Andreas Pashalidis
    • Andreas Pashalidis. http://www.kyps.net, 2007.
    • (2007)
  • 43
    • 18144416530 scopus 로고    scopus 로고
    • Mitchell. Impostor: A single sign-on system for use from untrusted devices
    • Andreas Pashalidis and Chris J. Mitchell. Impostor: a single sign-on system for use from untrusted devices. In Proc. IEEE Globecom 2004, 2004.
    • (2004) Proc. IEEE Globecom 2004
    • Pashalidis, A.1    Chris, J.2
  • 44
    • 0003462641 scopus 로고
    • Technical Report TR-81, Harvard University, Aiken Computation Laboratory
    • Michael Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard University, Aiken Computation Laboratory, 1981.
    • (1981) How to Exchange Secrets by Oblivious Transfer
    • Rabin, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.