메뉴 건너뛰기




Volumn 5824 LNCS, Issue , 2009, Pages 174-191

Strongly secure authenticated key exchange without NAXOS' approach

Author keywords

AKE; eCK model; NAXOS' approach; trapdoor test

Indexed keywords

AKE; AUTHENTICATED KEY EXCHANGE; DISCRETE LOGARITHMS; ECK MODEL; KEY DERIVATION FUNCTION; NAXOS' APPROACH; PRIVATE KEY; PUBLIC KEYS; RANDOM ORACLE; SECRET INFORMATION; SECURE PROTOCOLS; SECURITY ASSURANCE; SECURITY MODEL; SECURITY PROOFS; TRAPDOOR TEST;

EID: 77956327303     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04846-3_12     Document Type: Conference Paper
Times cited : (37)

References (26)
  • 1
    • 35048856922 scopus 로고    scopus 로고
    • Validation of elliptic curve public keys
    • Desmedt, Y. G. ed., Springer, Heidelberg
    • Antipa, A., Brown, D., Menezes, A., Struik, R., Vanstone, S.: Validation of elliptic curve public keys. In: Desmedt, Y. G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 211-223. Springer, Heidelberg (2002)
    • (2002) PKC 2003. LNCS , vol.2567 , pp. 211-223
    • Antipa, A.1    Brown, D.2    Menezes, A.3    Struik, R.4    Vanstone, S.5
  • 2
    • 0142156713 scopus 로고    scopus 로고
    • Variations of diffie-hellman problem
    • Qing, S., Gollmann, D., Zhou, J. eds., Springer, Heidelberg
    • Bao, F., Deng, R. H., Zhu, H.: Variations of diffie-hellman problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 301-312. Springer, Heidelberg (2003)
    • (2003) ICICS 2003. LNCS , vol.2836 , pp. 301-312
    • Bao, F.1    Deng, R.H.2    Zhu, H.3
  • 3
    • 35048881545 scopus 로고    scopus 로고
    • The knowledge-of-exponent assumptions and 3-round zeroknowledge protocols
    • Franklin, M. ed., Springer, Heidelberg
    • Bellare, M., Palacio, A.: The knowledge-of-exponent assumptions and 3-round zeroknowledge protocols. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 273-289. Springer, Heidelberg (2004)
    • (2004) CRYPTO 2004. LNCS , vol.3152 , pp. 273-289
    • Bellare, M.1    Palacio, A.2
  • 4
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Preneel, B. ed., Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2001)
    • (2001) EUROCRYPT 2000. LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 5
    • 0005078946 scopus 로고
    • Entity authentication and key distribution
    • Stinson, D. R. ed., Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D. R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 110-125. Springer, Heidelberg (1993)
    • (1993) CRYPTO 1993. LNCS , vol.773 , pp. 110-125
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • Bellare, M., Rogaway, P.: Provably secure session key distribution: the three party case. In: STOC 1995, pp. 57-66 (1995)
    • (1995) STOC 1995 , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 33646760559 scopus 로고    scopus 로고
    • Minimizing the use of random oracles in authenticated encryption schemes
    • Han, Y., Quing, S. eds., Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Minimizing the use of random oracles in authenticated encryption schemes. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 1-16. Springer, Heidelberg (1997)
    • (1997) ICICS 1997. LNCS , vol.1334 , pp. 1-16
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Pfitzmann, B. ed., Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
    • (2001) EUROCRYPT 2001. LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 9
    • 44449176564 scopus 로고    scopus 로고
    • The twin diffie-hellman problem and applications
    • Smart, N. P. ed., Springer, Heidelberg
    • Cash, D., Kiltz, E., Shoup, V.: The twin diffie-hellman problem and applications. In: Smart, N. P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 127-145. Springer, Heidelberg (2008)
    • (2008) EUROCRYPT 2008. LNCS , vol.4965 , pp. 127-145
    • Cash, D.1    Kiltz, E.2    Shoup, V.3
  • 11
    • 77956326531 scopus 로고    scopus 로고
    • Strongly secure authenticated key exchange protocol based on computational Diffie-Hellman problem
    • Huang, H., Cao, Z.: Strongly secure authenticated key exchange protocol based on computational Diffie-Hellman problem. In: Inscrypt 2008 (2008)
    • (2008) Inscrypt 2008
    • Huang, H.1    Cao, Z.2
  • 12
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A high-performance secure diffie-hellman protocol
    • Shoup, V. ed., Springer, Heidelberg
    • Krawczyk, H.: HMQV: A high-performance secure diffie-hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
    • (2005) CRYPTO 2005. LNCS , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 14
    • 0346761973 scopus 로고
    • A key recovery attack on discrete log-based schemes using a prime order subgroup
    • Kaliski Jr., B. S. ed., Springer, Heidelberg
    • Lim, C. H., Lee, P. J.: A key recovery attack on discrete log-based schemes using a prime order subgroup. In: Kaliski Jr., B. S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 249-263. Springer, Heidelberg (1994)
    • (1994) CRYPTO 1997. LNCS , vol.1294 , pp. 249-263
    • Lim, C.H.1    Lee, P.J.2
  • 15
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange
    • Susilo, W., Liu, J. K., Mu, Y. eds., Springer, Heidelberg
    • LaMacchia, B. A., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J. K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
    • (2007) ProvSec 2007. LNCS , vol.4784 , pp. 1-16
    • LaMacchia, B.A.1    Lauter, K.2    Mityagin, A.3
  • 21
    • 85009720314 scopus 로고    scopus 로고
    • On the importance of public-key validation in the MQV and HMQV key agreement protocols
    • Barua, R., Lange, T. eds., Springer, Heidelberg
    • Menezes, A., Ustaoglu, B.: On the importance of public-key validation in the MQV and HMQV key agreement protocols. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 133-147. Springer, Heidelberg (2006)
    • (2006) INDOCRYPT 2006. LNCS , vol.4329 , pp. 133-147
    • Menezes, A.1    Ustaoglu, B.2
  • 22
    • 38149140189 scopus 로고    scopus 로고
    • Authenticated key exchange and key encapsulation in the standard model
    • Kurosawa, K. ed., Springer, Heidelberg
    • Okamoto, T.: Authenticated key exchange and key encapsulation in the standard model. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 474-484. Springer, Heidelberg (2007)
    • (2007) ASIACRYPT 2007. LNCS , vol.4833 , pp. 474-484
    • Okamoto, T.1
  • 23
    • 84937389342 scopus 로고    scopus 로고
    • The Gap-Problems: A new class of problems for the security of cryptographic schemes
    • Kim, K.-c. ed., Springer, Heidelberg
    • Okamoto, T., Pointcheval, D.: The Gap-Problems: A new class of problems for the security of cryptographic schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104-118. Springer, Heidelberg (2001)
    • (2001) PKC 2001. LNCS , vol.1992 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 24
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. J. of Cryptology 13(3), 361-396 (2000)
    • (2000) J. of Cryptology , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 25
    • 38649136602 scopus 로고    scopus 로고
    • Obtaining a secure and efficient key agreement protocol for (H) MQV and NAXOS. Designs
    • Ustaǒglu, B.: Obtaining a secure and efficient key agreement protocol for (H) MQV and NAXOS. Designs, Codes and Cryptography 46(3), 329-342(2008), http://eprint.iacr.org/2007/123
    • (2008) Codes and Cryptography , vol.46 , Issue.3 , pp. 329-342
    • Ustaǒglu, B.1
  • 26
    • 77956319923 scopus 로고    scopus 로고
    • Efficient key exchange with tight security reduction
    • University of Waterloo
    • Wu, J., Ustaǒglu, B.: Efficient Key Exchange with Tight Security Reduction, Technical Report CACR 2009-23, University of Waterloo (2009), http://www.cacr.math.uwaterloo.ca/techreports/2009/cacr2009-23.pdf
    • (2009) Technical Report CACR 2009-23
    • Wu, J.1    Ustaǒglu, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.