메뉴 건너뛰기




Volumn 7293 LNCS, Issue , 2012, Pages 390-397

Password-based authenticated key exchange

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATED KEY EXCHANGE; AUTHENTICATED KEY EXCHANGE PROTOCOLS; CRYPTOGRAPHIC KEY; INSECURE NETWORKS; SECURITY NOTION;

EID: 84861657933     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-30057-8_23     Document Type: Conference Paper
Times cited : (23)

References (39)
  • 1
    • 38049071438 scopus 로고    scopus 로고
    • (Password) Authenticated Key Establishment: From 2-Party to Group
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Abdalla, M., Bohli, J.-M., González Vasco, M.I., Steinwandt, R.: (Password) Authenticated Key Establishment: From 2-Party to Group. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 499-514. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 499-514
    • Abdalla, M.1    Bohli, J.-M.2    González Vasco, M.I.3    Steinwandt, R.4
  • 4
    • 70350633105 scopus 로고    scopus 로고
    • Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
    • Preneel, B. (ed.) AFRICACRYPT 2009. Springer, Heidelberg
    • Abdalla, M., Catalano, D., Chevalier, C., Pointcheval, D.: Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 254-271. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5580 , pp. 254-271
    • Abdalla, M.1    Catalano, D.2    Chevalier, C.3    Pointcheval, D.4
  • 5
    • 79951790257 scopus 로고    scopus 로고
    • Contributory Password-Authenticated Group Key Exchange with Join Capability
    • Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
    • Abdalla, M., Chevalier, C., Granboulan, L., Pointcheval, D.: Contributory Password-Authenticated Group Key Exchange with Join Capability. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 142-160. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6558 , pp. 142-160
    • Abdalla, M.1    Chevalier, C.2    Granboulan, L.3    Pointcheval, D.4
  • 6
    • 70350302872 scopus 로고    scopus 로고
    • Smooth Projective Hashing for Conditionally Extractable Commitments
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth Projective Hashing for Conditionally Extractable Commitments. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 671-689. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 671-689
    • Abdalla, M.1    Chevalier, C.2    Pointcheval, D.3
  • 7
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
    • Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-Based Authenticated Key Exchange in the Three-Party Setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 65-84. Springer, Heidelberg (2005) (Pubitemid 41231326)
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 8
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols
    • Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
    • Abdalla, M., Pointcheval, D.: Simple Password-Based Encrypted Key Exchange Protocols. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 191-208. Springer, Heidelberg (2005) (Pubitemid 41231212)
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 191-208
    • Abdalla, M.1    Pointcheval, D.2
  • 9
    • 77649257689 scopus 로고    scopus 로고
    • A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
    • Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
    • Abdalla, M., Pointcheval, D.: A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 332-347. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 332-347
    • Abdalla, M.1    Pointcheval, D.2
  • 10
    • 33745126318 scopus 로고    scopus 로고
    • Secure Computation Without Authentication
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Barak, B., Canetti, R., Lindell, Y., Pass, R., Rabin, T.: Secure Computation Without Authentication. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 361-377. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 361-377
    • Barak, B.1    Canetti, R.2    Lindell, Y.3    Pass, R.4    Rabin, T.5
  • 12
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure against Dictionary Attacks
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 13
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 14
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • ACM Press May/June
    • Bellare, M., Rogaway, P.: Provably secure session key distribution: The three party case. In: 27th Annual ACM Symposium on Theory of Computing, pp. 57-66. ACM Press (May/June 1995)
    • (1995) 27th Annual ACM Symposium on Theory of Computing , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 15
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • IEEE Computer Society Press May
    • Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: 1992 IEEE Symposium on Security and Privacy, pp. 72-84. IEEE Computer Society Press (May 1992)
    • (1992) 1992 IEEE Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 16
    • 84937550984 scopus 로고    scopus 로고
    • Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Boyko, V., MacKenzie, P.D., Patel, S.: Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156-171. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.D.2    Patel, S.3
  • 17
    • 84958755223 scopus 로고    scopus 로고
    • Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
    • Zheng, Y. (ed.) ASIACRYPT 2002. Springer, Heidelberg
    • Bresson, E., Chevassut, O., Pointcheval, D.: Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 497-514. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 497-514
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 19
    • 35048866891 scopus 로고    scopus 로고
    • New Security Results on Encrypted Key Exchange
    • Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. Springer, Heidelberg
    • Bresson, E., Chevassut, O., Pointcheval, D.: New Security Results on Encrypted Key Exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 145-158. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2947 , pp. 145-158
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 21
    • 84948991087 scopus 로고
    • A Secure and Efficient Conference Key Distribution System
    • (Extended Abstract). De Santis, A. (ed.) EUROCRYPT 1994. Springer, Heidelberg
    • Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System (Extended Abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275-286. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 22
    • 15344345559 scopus 로고    scopus 로고
    • A secure and scalable group key exchange system
    • Burmester, M., Desmedt, Y.: A secure and scalable group key exchange system. Information Processing Letters 94(3), 137-143 (2005)
    • (2005) Information Processing Letters , vol.94 , Issue.3 , pp. 137-143
    • Burmester, M.1    Desmedt, Y.2
  • 23
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE Computer Society Press October
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science, pp. 136-145. IEEE Computer Society Press (October 2001)
    • (2001) 42nd Annual Symposium on Foundations of Computer Science , pp. 136-145
    • Canetti, R.1
  • 24
    • 24944566824 scopus 로고    scopus 로고
    • Universally composable password-based key exchange
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Canetti, R., Halevi, S., Katz, J., Lindell, Y., MacKenzie, P.: Universally Composable Password-Based Key Exchange. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 404-421. Springer, Heidelberg (2005) (Pubitemid 41313966)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 404-421
    • Canetti, R.1    Halevi, S.2    Katz, J.3    Lindell, Y.4    MacKenzie, P.5
  • 25
    • 35048899333 scopus 로고    scopus 로고
    • IPAKE: Isomorphisms for Password- Based Authenticated Key Exchange
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Catalano, D., Pointcheval, D., Pornin, T.: IPAKE: Isomorphisms for Password- Based Authenticated Key Exchange. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 477-493. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 477-493
    • Catalano, D.1    Pointcheval, D.2    Pornin, T.3
  • 26
    • 84947267092 scopus 로고    scopus 로고
    • Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 27
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding, Y., Horster, P.: Undetectable on-line password guessing attacks. SIGOPS Oper. Syst. Rev. 29, 77-86 (1995)
    • (1995) SIGOPS Oper. Syst. Rev. , vol.29 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 28
    • 40249098609 scopus 로고    scopus 로고
    • Faster and Shorter Password-Authenticated Key Exchange
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Gennaro, R.: Faster and Shorter Password-Authenticated Key Exchange. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 589-606. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 589-606
    • Gennaro, R.1
  • 29
    • 35248830706 scopus 로고    scopus 로고
    • A Framework for Password-based Authenticated Key Exchange
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Gennaro, R., Lindell, Y.: A Framework for Password-based Authenticated Key Exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 524-543. Springer, Heidelberg (2003), http://eprint.iacr.org/2003/032.ps.gz
    • (2003) LNCS , vol.2656 , pp. 524-543
    • Gennaro, R.1    Lindell, Y.2
  • 30
    • 33745793866 scopus 로고    scopus 로고
    • Password authenticated key exchange using hidden smooth subgroups
    • Atluri, V., Meadows, C., Juels, A. (eds.) ACM Press November
    • Gentry, C., Mackenzie, P.D., Ramzan, Z.: Password authenticated key exchange using hidden smooth subgroups. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM CCS 2005: 12th Conference on Computer and Communications Security, pp. 299-309. ACM Press (November 2005)
    • (2005) ACM CCS 2005: 12th Conference on Computer and Communications Security , pp. 299-309
    • Gentry, C.1    Mackenzie, P.D.2    Ramzan, Z.3
  • 31
    • 78650032056 scopus 로고    scopus 로고
    • A new framework for efficient password-based authenticated key exchange
    • Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM Press October
    • Groce, A., Katz, J.: A new framework for efficient password-based authenticated key exchange. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM CCS 2010: 17th Conference on Computer and Communications Security, pp. 516-525. ACM Press (October 2010)
    • (2010) ACM CCS 2010: 17th Conference on Computer and Communications Security , pp. 516-525
    • Groce, A.1    Katz, J.2
  • 32
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • Jablon, D.P.: Strong password-only authenticated key exchange. SIGCOMM Comput. Commun. Rev. 26(5), 5-26 (1996)
    • (1996) SIGCOMM Comput. Commun. Rev. , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.P.1
  • 33
    • 84945132563 scopus 로고    scopus 로고
    • Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Katz, J., Ostrovsky, R., Yung, M.: Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475-494. Springer, Heidelberg (2001) (Pubitemid 33275849)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 34
    • 72449123735 scopus 로고    scopus 로고
    • Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Katz, J., Vaikuntanathan, V.: Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 636-652. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 636-652
    • Katz, J.1    Vaikuntanathan, V.2
  • 35
    • 79953207657 scopus 로고    scopus 로고
    • Round-Optimal Password-Based Authenticated Key Exchange
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Katz, J., Vaikuntanathan, V.: Round-Optimal Password-Based Authenticated Key Exchange. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 293-310. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 293-310
    • Katz, J.1    Vaikuntanathan, V.2
  • 36
    • 84957025686 scopus 로고    scopus 로고
    • Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys
    • Christianson, B., Lomas, M. (eds.) Security Protocols 1997. Springer, Heidelberg
    • Lucks, S.: Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 79-90. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1361 , pp. 79-90
    • Lucks, S.1
  • 37
    • 84937402236 scopus 로고    scopus 로고
    • Password-Authenticated Key Exchange Based on RSA
    • Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
    • MacKenzie, P., Patel, S., Swaminathan, R.: Password-Authenticated Key Exchange Based on RSA. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 599-613. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 599-613
    • MacKenzie, P.1    Patel, S.2    Swaminathan, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.