메뉴 건너뛰기




Volumn 6615 LNCS, Issue , 2011, Pages 159-171

Password authenticated key exchange by juggling

Author keywords

EKE; key agreement; Password Authenticated Key Exchange; SPEKE

Indexed keywords

EKE; KEY AGREEMENT; MUTUAL AUTHENTICATION; PASSWORD-AUTHENTICATED KEY EXCHANGE; PUBLIC KEYS; PUBLIC-KEY INFRASTRUCTURE; SECURE COMMUNICATIONS; SECURITY ISSUES; SPEKE; ZERO KNOWLEDGE;

EID: 79960247093     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22137-8_23     Document Type: Conference Paper
Times cited : (28)

References (39)
  • 1
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols
    • Menezes, A. (ed.) CT-RSA 2005. Springer, Heidelberg
    • Abdalla, M., Pointcheval, D.: Simple password-based encrypted key exchange protocols. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 191-208. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3376 , pp. 191-208
    • Abdalla, M.1    Pointcheval, D.2
  • 2
    • 84957714601 scopus 로고
    • Robustness principles for public key protocols
    • Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
    • Anderson, R.J., Needham, R.: Robustness principles for public key protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 236-247. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 236-247
    • Anderson, R.J.1    Needham, R.2
  • 4
    • 79960267929 scopus 로고    scopus 로고
    • The official UK National Grid Service website
    • The official UK National Grid Service website, http://www.grid-support. ac.uk/
  • 6
    • 0142156713 scopus 로고    scopus 로고
    • Variations of Diffie-Hellman problem
    • Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. Springer, Heidelberg
    • Bao, F., Deng, R.H., Zhu, H.: Variations of Diffie-Hellman problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 301-312. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2836 , pp. 301-312
    • Bao, F.1    Deng, R.H.2    Zhu, H.3
  • 7
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 8
    • 84947778144 scopus 로고    scopus 로고
    • The decision Diffie-Hellman problem
    • Buhler, J.P. (ed.) ANTS 1998. Springer, Heidelberg
    • Boneh, D.: The decision Diffie-Hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48-63. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1423 , pp. 48-63
    • Boneh, D.1
  • 10
    • 35048866891 scopus 로고    scopus 로고
    • New security results on Encrypted Key Exchange
    • Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. Springer, Heidelberg
    • Bresson, E., Chevassut, O., Pointcheval, D.: New security results on Encrypted Key Exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 145-158. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2947 , pp. 145-158
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 11
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology 1(1), 65-67 (1988)
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-67
    • Chaum, D.1
  • 14
    • 0027741529 scopus 로고
    • Augmented Encrypted Key Exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • November
    • Bellovin, S., Merritt, M.: Augmented Encrypted Key Exchange: a password-based protocol secure against dictionary attacks and password file compromise. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 244-250 (November 1993)
    • (1993) Proceedings of the 1st ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 15
    • 78650629525 scopus 로고    scopus 로고
    • Cryptographic protocol for secure communications
    • U.S. Patent 5,241,599
    • Bellovin, S., Merritt, M.: Cryptographic protocol for secure communications, U.S. Patent 5,241,599, http://patft.uspto.gov/netacgi/nph- Parser?patentnumber=5241599
    • Bellovin, S.1    Merritt, M.2
  • 19
    • 33749542277 scopus 로고    scopus 로고
    • A method for making password-based key exchange resilient to server compromise
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Gentry, C., MacKenzie, P., Ramzan, Z.: A method for making password-based key exchange resilient to server compromise. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 142-159. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 142-159
    • Gentry, C.1    MacKenzie, P.2    Ramzan, Z.3
  • 21
  • 22
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • Jablon, D.: Strong password-only authenticated key exchange. ACM Computer Communications Review 26(5), 5-26 (1996)
    • (1996) ACM Computer Communications Review , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 24
    • 78650624029 scopus 로고    scopus 로고
    • Cryptographic methods for remote authentication
    • U.S. Patent 6,226,383
    • Jablon, D.: Cryptographic methods for remote authentication, U.S. Patent 6,226,383, http://patft.uspto.gov/netacgi/nph-Parser?patentnumber=6226383
    • Jablon, D.1
  • 25
    • 84937539386 scopus 로고    scopus 로고
    • Password authentication using multiple servers
    • Naccache, D. (ed.) CT-RSA 2001. Springer, Heidelberg
    • Jablon, D.: Password authentication using multiple servers. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 344-360. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2020 , pp. 344-360
    • Jablon, D.1
  • 26
    • 85084161708 scopus 로고    scopus 로고
    • Dual-workfactor Encrypted Key Exchange: Efficiently preventing password chaining and dictionary attacks
    • July
    • Jaspan, B.: Dual-workfactor Encrypted Key Exchange: efficiently preventing password chaining and dictionary attacks. In: Proceedings of the Sixth Annual USENIX Security Conference, pp. 43-50 (July 1996)
    • (1996) Proceedings of the Sixth Annual USENIX Security Conference , pp. 43-50
    • Jaspan, B.1
  • 27
    • 0036825859 scopus 로고    scopus 로고
    • Pretty-simple password-authenticated key-exchange under standard assumptions
    • Kobara, K., Imai, H.: Pretty-simple password-authenticated key-exchange under standard assumptions. IEICE Transactions E85-A(10), 2229-2237 (2002)
    • (2002) IEICE Transactions , vol.E85-A , Issue.10 , pp. 2229-2237
    • Kobara, K.1    Imai, H.2
  • 28
    • 1842499869 scopus 로고    scopus 로고
    • On Diffie-Hellman key agreement with short exponents
    • Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
    • Van Oorschot, P.C., Wiener, M.J.: On Diffie-Hellman key agreement with short exponents. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 332-343. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 332-343
    • Van Oorschot, P.C.1    Wiener, M.J.2
  • 31
    • 84937438236 scopus 로고    scopus 로고
    • Threshold password-authenticated key exchange
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • MacKenzie, P.D., Shrimpton, T., Jakobsson, M.: Threshold password-authenticated key exchange. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 385. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 385
    • MacKenzie, P.D.1    Shrimpton, T.2    Jakobsson, M.3
  • 33
    • 0013225845 scopus 로고    scopus 로고
    • On the Security of the SPEKE Password-Authenticated Key Exchange Protocol
    • MacKenzie, P.: On the Security of the SPEKE Password-Authenticated Key Exchange Protocol, Cryptology ePrint Archive: Report 057 (2001)
    • (2001) Cryptology EPrint Archive: Report 057
    • MacKenzie, P.1
  • 37
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161-174 (1991)
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 38
    • 0742325040 scopus 로고    scopus 로고
    • Analysis of the SPEKE password-authenticated key exchange protocol
    • Zhang, M.: Analysis of the SPEKE password-authenticated key exchange protocol. IEEE Communications Letters 8(1), 63-65 (2004)
    • (2004) IEEE Communications Letters , vol.8 , Issue.1 , pp. 63-65
    • Zhang, M.1
  • 39
    • 32644442153 scopus 로고    scopus 로고
    • Security analysis of a password-based authentication protocol proposed to IEEE 1363
    • Zhao, Z., Dong, Z., Wang, Y.: Security analysis of a password-based authentication protocol proposed to IEEE 1363. Theoretical Computer Science 352(1), 280-287 (2006)
    • (2006) Theoretical Computer Science , vol.352 , Issue.1 , pp. 280-287
    • Zhao, Z.1    Dong, Z.2    Wang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.