메뉴 건너뛰기




Volumn 78, Issue 2, 2012, Pages 651-669

Two-server password-only authenticated key exchange

Author keywords

Key exchange protocols; Passwords

Indexed keywords

COMPUTER NETWORKS; SYSTEMS SCIENCE;

EID: 84855988718     PISSN: 00220000     EISSN: 10902724     Source Type: Journal    
DOI: 10.1016/j.jcss.2011.09.005     Document Type: Article
Times cited : (22)

References (33)
  • 1
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Lecture Notes in Comput. Sci. Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway Authenticated key exchange secure against dictionary attacks Adv. in Cryptology - Eurocrypt 2000 Lecture Notes in Comput. Sci. vol. 1807 2000 Springer-Verlag 139 155
    • (2000) Adv. in Cryptology - Eurocrypt 2000 , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Lecture Notes in Comput. Sci. Springer-Verlag
    • M. Bellare, and P. Rogaway Entity authentication and key distribution Adv. in Cryptology - Crypto 1993 Lecture Notes in Comput. Sci. vol. 773 1994 Springer-Verlag 232 249
    • (1994) Adv. in Cryptology - Crypto 1993 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • ACM
    • S.M. Bellovin, and M. Merritt Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise 1st ACM Conf. on Computer and Comm. Security 1993 ACM 244 250
    • (1993) 1st ACM Conf. on Computer and Comm. Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 8
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-Hellman
    • Lecture Notes in Comput. Sci. Springer-Verlag
    • V. Boyko, P. MacKenzie, and S. Patel Provably secure password- authenticated key exchange using Diffie-Hellman Adv. in Cryptology - Eurocrypt 2000 Lecture Notes in Comput. Sci. vol. 1807 2000 Springer-Verlag 156 171
    • (2000) Adv. in Cryptology - Eurocrypt 2000 , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 9
    • 33646717563 scopus 로고    scopus 로고
    • Nightingale: A new two-server approach for authentication with short secrets
    • J. Brainard, A. Juels, B. Kaliski, M. Szydlo, Nightingale: A new two-server approach for authentication with short secrets, in: 12th USENIX Security Symp., 2003, pp. 201-213.
    • (2003) 12th USENIX Security Symp. , pp. 201-213
    • Brainard, J.1    Juels, A.2    Kaliski, B.3    Szydlo, M.4
  • 10
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • R. Canetti, O. Goldreich, and S. Halevi The random oracle methodology, revisited J. ACM 51 4 2004 557 594
    • (2004) J. ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 11
    • 24944566824 scopus 로고    scopus 로고
    • Universally composable password-based key exchange
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • R. Canetti, S. Halevi, J. Katz, Y. Lindell, and P. MacKenzie Universally-composable password authenticated key exchange Adv. in Cryptology - Eurocrypt 2005 Lecture Notes in Comput. Sci. vol. 3494 2005 Springer-Verlag 404 421 (Pubitemid 41313966)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 404-421
    • Canetti, R.1    Halevi, S.2    Katz, J.3    Lindell, Y.4    MacKenzie, P.5
  • 13
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Lecture Notes in Comput. Sci. Springer-Verlag
    • R. Cramer, I. Damgård, and B. Schoenmakers Proofs of partial knowledge and simplified design of witness hiding protocols Adv. in Cryptology - Crypto 1994 Lecture Notes in Comput. Sci. vol. 839 1994 Springer-Verlag 174 187
    • (1994) Adv. in Cryptology - Crypto 1994 , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 14
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • R. Cramer, and V. Shoup Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J. Comput. 33 1 2003 167 226
    • (2003) SIAM J. Comput. , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 16
    • 33746703635 scopus 로고    scopus 로고
    • Provably secure threshold password-authenticated key exchange
    • DOI 10.1016/j.jcss.2006.02.002, PII S002200000600033X
    • M. Di Raimondo, and R. Gennaro Provably secure threshold password-authenticated key exchange J. Comput. System Sci. 72 6 2006 978 1001 (Pubitemid 44163573)
    • (2006) Journal of Computer and System Sciences , vol.72 , Issue.6 , pp. 978-1001
    • Di Raimondo, M.1    Gennaro, R.2
  • 17
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Inform. Theory 31 1985 469 472
    • (1985) IEEE Trans. Inform. Theory , vol.31 , pp. 469-472
    • El Gamal, T.1
  • 20
    • 33745184723 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • preliminary version in Crypto 2001
    • O. Goldreich, and Y. Lindell Session-key generation using human passwords only J. Cryptology 19 3 2006 241 340 preliminary version in Crypto 2001
    • (2006) J. Cryptology , vol.19 , Issue.3 , pp. 241-340
    • Goldreich, O.1    Lindell, Y.2
  • 22
    • 71849087704 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • S. Halevi, and H. Krawczyk Public-key cryptography and password protocols ACM Trans. Inf. Syst. Secur. 2 3 1999 230 268
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.3 , pp. 230-268
    • Halevi, S.1    Krawczyk, H.2
  • 23
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon Strong password-only authenticated key exchange ACM Comput. Commun. Rev. 26 5 1996 5 20
    • (1996) ACM Comput. Commun. Rev. , vol.26 , Issue.5 , pp. 5-20
    • Jablon, D.1
  • 24
    • 84937539386 scopus 로고    scopus 로고
    • Password Authentication Using Multiple Servers
    • Topics in Cryptology - CT-RSA 2001 The Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
    • D. Jablon Password authentication using multiple servers RSA Cryptographers Track 2001 Lecture Notes in Comput. Sci. vol. 2020 2001 Springer-Verlag 344 360 (Pubitemid 33255175)
    • (2001) Lecture Notes in Computer Science , Issue.2020 , pp. 344-360
    • Jablon, D.P.1
  • 26
    • 71449093776 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • J. Katz, R. Ostrovsky, and M. Yung Efficient password-authenticated key exchange using human-memorable passwords J. ACM 57 1 2009 78 116
    • (2009) J. ACM , vol.57 , Issue.1 , pp. 78-116
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 28
    • 84957025686 scopus 로고    scopus 로고
    • Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys
    • Security Protocols
    • S. Lucks Open key exchange: How to defeat dictionary attacks without encrypting public keys Proc. Security Protocols Workshop Lecture Notes in Comput. Sci. vol. 1361 1997 Springer-Verlag 79 90 (Pubitemid 128023881)
    • (1998) Lecture Notes in Computer Science , Issue.1361 , pp. 79-90
    • Lucks, S.1
  • 31
    • 29644437598 scopus 로고    scopus 로고
    • Threshold password-authenticated key exchange
    • DOI 10.1007/s00145-005-0232-5
    • P. MacKenzie, T. Shrimpton, and M. Jakobsson Threshold password-authenticated key exchange J. Cryptology 19 1 2006 27 66 (Pubitemid 43023010)
    • (2006) Journal of Cryptology , vol.19 , Issue.1 , pp. 27-66
    • MacKenzie, P.1    Shrimpton, T.2    Jakobsson, M.3
  • 32
    • 24144440891 scopus 로고    scopus 로고
    • Proofs for two-server password authentication
    • Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
    • M. Szydlo, and B. Kaliski Proofs for two-server password authentication RSA Cryptographers Track 2005 Lecture Notes in Comput. Sci. vol. 3376 2005 Springer-Verlag 227 244 (Pubitemid 41231214)
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 227-244
    • Szydlo, M.1    Kaliski, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.