메뉴 건너뛰기




Volumn 7089 LNCS, Issue , 2011, Pages 451-468

On forward secrecy in one-round key exchange

Author keywords

[No Author keywords available]

Indexed keywords

FORWARD SECRECY; KEY EXCHANGE; KEY EXCHANGE PROTOCOLS; SECURE PROTOCOLS;

EID: 83755180769     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25516-8_27     Document Type: Conference Paper
Times cited : (22)

References (26)
  • 1
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • ACM Press
    • Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: 30th ACM Symposium on Theory of Computing, pp. 419-428. ACM Press (1998), http://www-cse.ucsd.edu/users/mihir/papers/key-distribution.html
    • (1998) 30th ACM Symposium on Theory of Computing , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure against Dictionary Attacks
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994), http://www-cse.ucsd.edu/users/mihir
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 0001940580 scopus 로고
    • Provably secure session key distribution - The three party case
    • ACM Press
    • Bellare, M., Rogaway, P.: Provably secure session key distribution - the three party case. In: 27th ACM Symposium on Theory of Computing, pp. 57-66. ACM Press (1995)
    • (1995) 27th ACM Symposium on Theory of Computing , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 70349858083 scopus 로고    scopus 로고
    • Efficient One-Round Key Exchange in the Standard Model
    • Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. Springer, Heidelberg
    • Boyd, C., Cliff, Y., Gonzalez Nieto, J.M., Paterson, K.G.: Efficient One-Round Key Exchange in the Standard Model. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 69-83. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5107 , pp. 69-83
    • Boyd, C.1    Cliff, Y.2    Gonzalez Nieto, J.M.3    Paterson, K.G.4
  • 6
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-exchange Protocols and their use for Building Secure Channels
    • Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Analysis of Key-exchange Protocols and their use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001), http://eprint.iacr.org/ 2001/040/
    • (2001) LNCS, 2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 7
    • 84947232363 scopus 로고    scopus 로고
    • Universally Composable Notions of Key Exchange and Secure Channels
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Universally Composable Notions of Key Exchange and Secure Channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 337-351. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 8
    • 77649246342 scopus 로고    scopus 로고
    • Reusing Static Keys in Key Agreement Protocols
    • Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. Springer, Heidelberg
    • Chatterjee, S., Menezes, A., Ustaoglu, B.: Reusing Static Keys in Key Agreement Protocols. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 39-56. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5922 , pp. 39-56
    • Chatterjee, S.1    Menezes, A.2    Ustaoglu, B.3
  • 9
    • 38149091828 scopus 로고    scopus 로고
    • Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
    • Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. Springer, Heidelberg
    • Chow, S.S.M., Choo, K.-K.R.: Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 203-220. Springer, Heidelberg (2007), http://eprint.iacr.org/2007/018
    • (2007) LNCS , vol.4779 , pp. 203-220
    • Chow, S.S.M.1    Choo, K.-K.R.2
  • 12
    • 67049104242 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2006/260
    • Dent, A.W.: A note on game-hopping proofs. Cryptology ePrint Archive, Report 2006/260 (2006), http://eprint.iacr.org/2006/260/
    • (2006) A Note on Game-hopping Proofs.
    • Dent, A.W.1
  • 15
    • 79956318444 scopus 로고    scopus 로고
    • Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
    • Zhou, J., Yung, M. (eds.) ACNS 2010. Springer, Heidelberg
    • Gennaro, R., Krawczyk, H., Rabin, T.: Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 309-328. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6123 , pp. 309-328
    • Gennaro, R.1    Krawczyk, H.2    Rabin, T.3
  • 16
    • 35048878818 scopus 로고    scopus 로고
    • One-round Protocols for Two-party Authenticated Key Exchange
    • Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. Springer, Heidelberg
    • Jeong, I.R., Katz, J., Lee, D.-H.: One-round Protocols for Two-party Authenticated Key Exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 220-232. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3089 , pp. 220-232
    • Jeong, I.R.1    Katz, J.2    Lee, D.-H.3
  • 17
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A High-Performance Secure Diffie-Hellman Protocol
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005), http://eprint.iacr.org/2005/176/
    • (2005) LNCS , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 18
    • 38149012093 scopus 로고    scopus 로고
    • Stronger Security of Authenticated Key Exchange
    • Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. Springer, Heidelberg
    • LaMacchia, B.A., Lauter, K., Mityagin, A.: Stronger Security of Authenticated Key Exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4784 , pp. 1-16
    • LaMacchia, B.A.1    Lauter, K.2    Mityagin, A.3
  • 19
    • 77958053911 scopus 로고    scopus 로고
    • Comparing the pre- And post-specified peer models for key agreement
    • Menezes, A., Ustaoglu, B.: Comparing the pre- and post-specified peer models for key agreement. IJACT 1(3), 236-250 (2009)
    • (2009) IJACT , vol.1 , Issue.3 , pp. 236-250
    • Menezes, A.1    Ustaoglu, B.2
  • 20
    • 84964242030 scopus 로고
    • Key Distribution Systems Based on Identification Information
    • Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
    • Okamoto, E.: Key Distribution Systems Based on Identification Information. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 194-202. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 194-202
    • Okamoto, E.1
  • 22
    • 84937389342 scopus 로고    scopus 로고
    • The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
    • Public Key Cryptography
    • Okamoto, T., Pointcheval, D.: The Gap-problems: a New Class of Problems for the Security of Cryptographic Schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104-118. Springer, Heidelberg (2001) (Pubitemid 33232936)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1992 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 25
    • 77958071785 scopus 로고    scopus 로고
    • Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
    • Pieprzyk, J., Zhang, F. (eds.) ProvSec 2009. Springer, Heidelberg
    • Ustaoglu, B.: Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols. In: Pieprzyk, J., Zhang, F. (eds.) ProvSec 2009. LNCS, vol. 5848, pp. 183-197. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5848 , pp. 183-197
    • Ustaoglu, B.1
  • 26
    • 38649136602 scopus 로고    scopus 로고
    • Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
    • Ustaoglu, B.: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. Des. Codes Cryptography 46(3), 329-342 (2008)
    • (2008) Des. Codes Cryptography , vol.46 , Issue.3 , pp. 329-342
    • Ustaoglu, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.