메뉴 건너뛰기




Volumn 6223 LNCS, Issue , 2010, Pages 255-276

Credential authenticated identification and key exchange

Author keywords

[No Author keywords available]

Indexed keywords

COMMON REFERENCE STRING MODELS; KEY EXCHANGE; KEY-EXCHANGE PROTOCOL; PASSWORD-AUTHENTICATED KEY EXCHANGE; PUBLIC KEY INFRASTRUCTURE; RANDOM ORACLE; SECURITY NOTION; SERVER COMPROMISE; UNIVERSAL COMPOSABILITY; WITHOUT RANDOM ORACLES;

EID: 77956987281     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14623-7_14     Document Type: Conference Paper
Times cited : (21)

References (13)
  • 1
    • 70350302872 scopus 로고    scopus 로고
    • Smooth projective hashing for conditionally extractable commitments
    • Halevi, S. (ed.) LNCS Springer, Heidelberg
    • Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth projective hashing for conditionally extractable commitments. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 671-689. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009 , vol.5677 , pp. 671-689
    • Abdalla, M.1    Chevalier, C.2    Pointcheval, D.3
  • 2
    • 33745126318 scopus 로고    scopus 로고
    • Secure computation without authentication
    • Shoup, V. (ed.) LNCS Springer, Heidelberg
    • Barak, B., Canetti, R., Lindell, Y., Pass, R., Rabin, T.: Secure computation without authentication. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 361-377. Springer, Heidelberg (2005), http://eprint.iacr.org/2007/464
    • (2005) CRYPTO 2005 , vol.3621 , pp. 361-377
    • Barak, B.1    Canetti, R.2    Lindell, Y.3    Pass, R.4    Rabin, T.5
  • 3
    • 85048601848 scopus 로고
    • Cryptographic protocols provably secure against dynamic adversaries
    • Rueppel, R.A. (ed.) LNCS Springer, Heidelberg
    • Beaver, D., Haber, S.: Cryptographic protocols provably secure against dynamic adversaries. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 307-323. Springer, Heidelberg (1993)
    • (1993) EUROCRYPT 1992 , vol.658 , pp. 307-323
    • Beaver, D.1    Haber, S.2
  • 5
    • 84945135810 scopus 로고    scopus 로고
    • Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
    • Camenisch, J., Lysyanskaya, L.: Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Crypto 2001, pp. 93-118 (2001)
    • (2001) Crypto 2001 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, L.2
  • 6
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Boneh, D. (ed.) LNCS Springer, Heidelberg
    • Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 126-144. Springer, Heidelberg (2003), http://eprint.iacr.org/2002/161
    • (2003) CRYPTO 2003 , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 8
    • 38049064364 scopus 로고    scopus 로고
    • Universally composable security with global setup
    • Full version at
    • Canetti, R., Dodis, Y., Pass, R., Walfish, S.: Universally composable security with global setup. In: Theory of Cryptography 2007, pp. 61-85 (2007), Full version at http://eprint.iacr.org/2006/432
    • (2007) Theory of Cryptography 2007 , pp. 61-85
    • Canetti, R.1    Dodis, Y.2    Pass, R.3    Walfish, S.4
  • 9
    • 24944566824 scopus 로고    scopus 로고
    • Universally composable password-based key exchange
    • Cramer, R. (ed.) LNCS Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J., Lindell, Y., MacKenzie, P.: Universally composable password-based key exchange. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 404-421. Springer, Heidelberg (2005)
    • (2005) EUROCRYPT 2005 , vol.3494 , pp. 404-421
    • Canetti, R.1    Halevi, S.2    Katz, J.3    Lindell, Y.4    MacKenzie, P.5
  • 10
    • 35248819315 scopus 로고    scopus 로고
    • Universal composition with joint state
    • Boneh, D. (ed.) LNCS Springer, Heidelberg
    • Canetti, R., Rabin, T.: Universal composition with joint state. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 265-281. Springer, Heidelberg (2003), http://eprint.iacr.org/2002/047
    • (2003) CRYPTO 2003 , vol.2729 , pp. 265-281
    • Canetti, R.1    Rabin, T.2
  • 11
    • 33749542277 scopus 로고    scopus 로고
    • A method for making password-based key exchange resilient to server compromise
    • Dwork, C. (ed.) LNCS Springer, Heidelberg
    • Gentry, C., MacKenzie, P., Ramzan, Z.: A method for making password-based key exchange resilient to server compromise. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 142-159. Springer, Heidelberg (2006)
    • (2006) CRYPTO 2006 , vol.4117 , pp. 142-159
    • Gentry, C.1    MacKenzie, P.2    Ramzan, Z.3
  • 12
    • 43149110632 scopus 로고    scopus 로고
    • Beyond secret handshakes: Affiliation-hiding authenticated key agreement
    • Malkin, T.G. (ed.) LNCS Springer, Heidelberg
    • Jarecki, S., Kim, J., Tsudik, G.: Beyond secret handshakes: affiliation-hiding authenticated key agreement. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 352-369. Springer, Heidelberg (2008)
    • (2008) CT-RSA 2008 , vol.4964 , pp. 352-369
    • Jarecki, S.1    Kim, J.2    Tsudik, G.3
  • 13
    • 84948968753 scopus 로고    scopus 로고
    • Adaptively secure threshold cryptography: Introducing concurrency, removing erasures
    • Preneel, B. (ed.) LNCS Springer, Heidelberg
    • Jarecki, S., Lysyanskaya, A.: Adaptively secure threshold cryptography: introducing concurrency, removing erasures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 221-242. Springer, Heidelberg (2000)
    • (2000) EUROCRYPT 2000 , vol.1807 , pp. 221-242
    • Jarecki, S.1    Lysyanskaya, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.