메뉴 건너뛰기




Volumn , Issue , 2010, Pages 516-525

A new framework for efficient password-based authenticated key exchange

Author keywords

Security

Indexed keywords

AUTHENTICATED KEY EXCHANGE; COMMON REFERENCE STRING MODELS; NEW APPROACHES; OFF-LINE DICTIONARY ATTACKS; SECURITY; SESSION KEY; THE STANDARD MODEL; UNIVERSAL COMPOSABILITY; WITHOUT RANDOM ORACLES;

EID: 78650032056     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866365     Document Type: Conference Paper
Times cited : (100)

References (26)
  • 1
    • 43149104991 scopus 로고    scopus 로고
    • Efficient two-party password-based key exchange protocols in the UC framework
    • Cryptographers' Track - RSA 2008, Springer
    • M. Abdalla, D. Catalano, C. Chevalier, and D. Pointcheval. Efficient two-party password-based key exchange protocols in the UC framework. In Cryptographers' Track - RSA 2008, volume 4964 of LNCS, pages 335-351. Springer, 2008.
    • (2008) LNCS , vol.4964 , pp. 335-351
    • Abdalla, M.1    Catalano, D.2    Chevalier, C.3    Pointcheval, D.4
  • 2
    • 70350302872 scopus 로고    scopus 로고
    • Smooth projective hashing for conditionally extractable commitments
    • Advances in Cryptology - Crypto 2009, Springer
    • M. Abdalla, C. Chevalier, and D. Pointcheval. Smooth projective hashing for conditionally extractable commitments. In Advances in Cryptology - Crypto 2009, volume 5677 of LNCS, pages 671-689. Springer, 2009.
    • (2009) LNCS , vol.5677 , pp. 671-689
    • Abdalla, M.1    Chevalier, C.2    Pointcheval, D.3
  • 3
    • 33745126318 scopus 로고    scopus 로고
    • Secure computation without authentication
    • Advances in Cryptology - Crypto 2005, Springer
    • B. Barak, R. Canetti, Y. Lindell, R. Pass, and T. Rabin. Secure computation without authentication. In Advances in Cryptology - Crypto 2005, volume 3621 of LNCS, pages 361-377. Springer, 2005.
    • (2005) LNCS , vol.3621 , pp. 361-377
    • Barak, B.1    Canetti, R.2    Lindell, Y.3    Pass, R.4    Rabin, T.5
  • 4
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Advances in Cryptology - Eurocrypt 2000, Springer
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Advances in Cryptology - Eurocrypt 2000, volume 1807 of LNCS, pages 139-155. Springer, 2000.
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 5
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Advances in Cryptology - Crypto '93, Springer
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology - Crypto '93, volume 773 of LNCS, pages 232-249. Springer, 1994.
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • IEEE
    • S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In IEEE Symposium on Security & Privacy, pages 72-84. IEEE, 1992.
    • (1992) IEEE Symposium on Security & Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 8
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Di±e-Hellman
    • Advances in Cryptology - Eurocrypt 2000, Springer
    • V. Boyko, P. D. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Di±e-Hellman. In Advances in Cryptology - Eurocrypt 2000, volume 1807 of LNCS, pages 156-171. Springer, 2000.
    • (2000) LNCS , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.D.2    Patel, S.3
  • 10
    • 24944566824 scopus 로고    scopus 로고
    • Universally composable password-based key exchange
    • Advances in Cryptology - Eurocrypt 2005, Springer
    • R. Canetti, S. Halevi, J. Katz, Y. Lindell, and P. D. MacKenzie. Universally composable password-based key exchange. In Advances in Cryptology - Eurocrypt 2005, volume 3494 of LNCS, pages 404-421. Springer, 2005.
    • (2005) LNCS , vol.3494 , pp. 404-421
    • Canetti, R.1    Halevi, S.2    Katz, J.3    Lindell, Y.4    MacKenzie, P.D.5
  • 11
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Advances in Cryptology - Eurocrypt 2002, Springer
    • R. Cramer and V. Shoup. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In Advances in Cryptology - Eurocrypt 2002, volume 2332 of LNCS, pages 45-64. Springer, 2002.
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 12
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1):167-226, 2003.
    • (2003) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 13
    • 40249098609 scopus 로고    scopus 로고
    • Faster and shorter password-authenticated key exchange
    • 5th Theory of Cryptography Conference - TCC 2008, Springer
    • R. Gennaro. Faster and shorter password-authenticated key exchange. In 5th Theory of Cryptography Conference - TCC 2008, volume 4948 of LNCS, pages 589-606. Springer, 2008.
    • (2008) LNCS , vol.4948 , pp. 589-606
    • Gennaro, R.1
  • 14
    • 33748310753 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • R. Gennaro and Y. Lindell. A framework for password-based authenticated key exchange. ACM Trans. Information and System Security, 9(2):181-234, 2006.
    • (2006) ACM Trans. Information and System Security , vol.9 , Issue.2 , pp. 181-234
    • Gennaro, R.1    Lindell, Y.2
  • 15
    • 33745184723 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • O. Goldreich and Y. Lindell. Session-key generation using human passwords only. Journal of Cryptology, 19(3):241-340, 2006.
    • (2006) Journal of Cryptology , vol.19 , Issue.3 , pp. 241-340
    • Goldreich, O.1    Lindell, Y.2
  • 19
    • 24144432254 scopus 로고    scopus 로고
    • Password based key exchange with mutual authentication
    • 11th Annual International Workshop on Selected Areas in Cryptography (SAC), Springer
    • S. Jiang and G. Gong. Password based key exchange with mutual authentication. In 11th Annual International Workshop on Selected Areas in Cryptography (SAC), volume 3357 of LNCS, pages 267-279. Springer, 2004.
    • (2004) LNCS , vol.3357 , pp. 267-279
    • Jiang, S.1    Gong, G.2
  • 20
    • 26444562427 scopus 로고    scopus 로고
    • Two-server password-only authenticated key exchange
    • 3rd Intl. Conference on Applied Cryptography and Network Security, Springer
    • J. Katz, P. D. MacKenzie, G. Taban, and V. D. Gligor. Two-server password-only authenticated key exchange. In 3rd Intl. Conference on Applied Cryptography and Network Security, volume 3531 of LNCS, pages 1-16. Springer, 2005.
    • (2005) LNCS , vol.3531 , pp. 1-16
    • Katz, J.1    MacKenzie, P.D.2    Taban, G.3    Gligor, V.D.4
  • 21
    • 71449093776 scopus 로고    scopus 로고
    • Efficient and secure authenticated key exchange using weak passwords
    • J. Katz, R. Ostrovsky, and M. Yung. Efficient and secure authenticated key exchange using weak passwords. J. ACM, 57(1):78-116, 2009.
    • (2009) J. ACM , vol.57 , Issue.1 , pp. 78-116
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 22
    • 72449123735 scopus 로고    scopus 로고
    • Smooth projective hashing and password-based authenticated key exchange from lattices
    • Advances in Cryptology - Asiacrypt 2009, Springer
    • J. Katz and V. Vaikuntanathan. Smooth projective hashing and password-based authenticated key exchange from lattices. In Advances in Cryptology - Asiacrypt 2009, volume 5912 of LNCS, pages 636-652. Springer, 2009.
    • (2009) LNCS , vol.5912 , pp. 636-652
    • Katz, J.1    Vaikuntanathan, V.2
  • 23
    • 35048835796 scopus 로고    scopus 로고
    • A new paradigm of hybrid encryption scheme
    • Advances in Cryptology - Crypto 2004, Springer
    • K. Kurosawa and Y. Desmedt. A new paradigm of hybrid encryption scheme. In Advances in Cryptology - Crypto 2004, volume 3152 of LNCS, pages 426-442. Springer, 2004.
    • (2004) LNCS , vol.3152 , pp. 426-442
    • Kurosawa, K.1    Desmedt, Y.2
  • 24
    • 84937402236 scopus 로고    scopus 로고
    • Password-authenticated key exchange based on RSA
    • Advances in Cryptology - Asiacrypt 2000, Springer
    • P. D. MacKenzie, S. Patel, and R. Swaminathan. Password-authenticated key exchange based on RSA. In Advances in Cryptology - Asiacrypt 2000, volume 1976 of LNCS, pages 599-613. Springer, 2000.
    • (2000) LNCS , vol.1976 , pp. 599-613
    • MacKenzie, P.D.1    Patel, S.2    Swaminathan, R.3
  • 25
    • 38849201191 scopus 로고    scopus 로고
    • Simpler session-key generation from short random passwords
    • M.-H. Nguyen and S. Vadhan. Simpler session-key generation from short random passwords. Journal of Cryptology, 21(1):52-96, 2008.
    • (2008) Journal of Cryptology , vol.21 , Issue.1 , pp. 52-96
    • Nguyen, M.-H.1    Vadhan, S.2
  • 26
    • 17144422244 scopus 로고    scopus 로고
    • A proposal for an ISO standard for public-key encryption
    • V. Shoup. A proposal for an ISO standard for public-key encryption. Cryptology ePrint Archive, Report 2001/112, 2001. http://eprint.iacr.org
    • (2001) Cryptology EPrint Archive, Report 2001/112
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.