메뉴 건너뛰기




Volumn 2139 LNCS, Issue , 2001, Pages 408-432

Session-key generation using human passwords only

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; POLYNOMIAL APPROXIMATION;

EID: 84880888233     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44647-8_24     Document Type: Conference Paper
Times cited : (161)

References (39)
  • 1
    • 33746365751 scopus 로고
    • Secure multi-party protocols and zero-knowledge proof systems tolerating a fault minority
    • D. Beaver. Secure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Fault Minority. Journal of Cryptology, Vol. 4, pages 75-122, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 75-122
    • Beaver, D.1
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Springer-Verlag (LNCS 1807)
    • M. Bellare, D. Pointcheval and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In EuroCrypt 2000, Springer-Verlag (LNCS 1807), pages 139-155, 2000.
    • (2000) EuroCrypt 2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM
    • M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In 1st Conf. on Computer and Communications Security, ACM, pages 62-73, 1993.
    • (1993) 1st Conf. on Computer and Communications Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Springer-Verlag (LNCS 773)
    • M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In CRYPTO'93, Springer-Verlag (LNCS 773), pages 232-249, 1994.
    • (1994) CRYPTO'93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • S. M. Bellovin and M. Merritt. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In Proceedings of the 1st ACM Conference on Computer and Communication Security, pages 244-250, 1993.
    • (1993) Proceedings of the 1st ACM Conference on Computer and Communication Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 7
    • 0003030602 scopus 로고
    • Coin flipping by phone
    • February
    • M. Blum. Coin Flipping by Phone. IEEE Spring COMPCOM, pages 133-137, February 1982.
    • (1982) IEEE Spring COMPCOM , pp. 133-137
    • Blum, M.1
  • 8
    • 84949995981 scopus 로고    scopus 로고
    • An efficient probabilistic public-key encryption scheme which hides all partial information
    • Springer-Verlag (LNCS 196)
    • M. Blum and S. Goldwasser. An Efficient Probabilistic Public-Key Encryption Scheme which hides all partial information. In CRYPTO'84, Springer-Verlag (LNCS 196), pages 289-302.
    • CRYPTO'84 , pp. 289-302
    • Blum, M.1    Goldwasser, S.2
  • 9
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SICOMP, Vol. 13, pages 850-864, 1984.
    • (1984) SICOMP , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 10
    • 33748099130 scopus 로고
    • Preliminary version
    • Preliminary version in 23rd FOCS, 1982.
    • (1982) 23rd FOCS
  • 12
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using diffie-hellman
    • Springer-Verlag (LNCS 1807)
    • V. Boyko, P. MacKenzie and S. Patel. Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman. In EuroCrypt 2000, Springer-Verlag (LNCS 1807), pages 156-171, 2000.
    • (2000) EuroCrypt 2000 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 13
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multi-party cryptographic protocols
    • R. Canetti. Security and Composition of Multi-party Cryptographic Protocols. Journal of Cryptology, Vol. 13, No. 1, pages 143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 14
    • 0003551074 scopus 로고    scopus 로고
    • A unified framework for analyzing security of protocols
    • R. Canetti. A unified framework for analyzing security of protocols. Cryptology ePrint Archive, Report No. 2000/067, 2000. Available from http://eprint.iacr.org.
    • (2000) Cryptology EPrint Archive, Report No. 2000/067
    • Canetti, R.1
  • 16
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie, and M.E. Hellman. New Directions in Cryptography. IEEE Trans. on Info. Theory, IT-22 (Nov. 1976), pages 644-654.
    • (1976) IEEE Trans. on Info. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 18
    • 0024984004 scopus 로고
    • Witness indistinguishability and witness hiding protocols
    • U. Feige and A. Shamir. Witness Indistinguishability and Witness Hiding Protocols. In 22nd STOC, pages 416-426, 1990.
    • (1990) 22nd STOC , pp. 416-426
    • Feige, U.1    Shamir, A.2
  • 20
    • 0022793132 scopus 로고
    • How to construct random functions
    • Preliminary version, 1998. Available from http://www.wisdom.weizmann.ac. il/~oded/pp.html.
    • (1986) JACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 21
    • 0000108216 scopus 로고    scopus 로고
    • How to construct constant-round zero-knowledge proof systems for NP
    • O. Goldreich, S. Goldwasser, and S. Micali. How to Construct Random Functions. JACM, Vol. 33, No. 4, pages 792-807, 1986.
    • (1996) Journal of Cryptology , vol.9 , pp. 167-189
    • Goldreich, O.1    Kahan, A.2
  • 22
    • 0023545076 scopus 로고
    • How to play any mental game - A completeness theorem for protocols with honest majority
    • For details see [18]
    • O. Goldreich and A. Kahan. How To Construct Constant-Round Zero-Knowledge Proof Systems for NP. Journal of Cryptology, Vol. 9, pages 167-189, 1996.
    • (1987) 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 23
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • O. Goldreich, S. Micali and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987. For details see [18].
    • (1984) JCSS , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 25
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • S. Halevi and H. Krawczyk. Public-Key Cryptography and Password Protocols. In ACM Conference on Computer and Communications Security, 1998.
    • (1996) SIGCOMM Comput. Commun. Rev. , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.P.1
  • 26
    • 0030261758 scopus 로고    scopus 로고
    • Practical password-authenticated key exchange provably secure under standard assumptions
    • D. P. Jablon. Strong password-only authenticated key exchange. SIGCOMM Comput. Commun. Rev., Vol 26, No. 5, pages 5-26, 1996.
    • Eurocrypt 2001
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 31
    • 35248839747 scopus 로고
    • Preliminary version Springer-Verlag (LNCS 576)
    • S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in Crypto'91, Springer-Verlag (LNCS 576), 1991.
    • (1991) Crypto'91
  • 32
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • M. Naor and B. Pinkas. Oblivious Transfer and Polynomial Evaluation. In 31st STOC, pages 245-254, 1999.
    • (1999) 31st STOC , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 34
    • 84957621865 scopus 로고    scopus 로고
    • On the concurrent composition of zero-knowledge proofs
    • R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In EuroCrypt99, pages 415-431.
    • EuroCrypt99 , pp. 415-431
    • Richardson, R.1    Kilian, J.2
  • 35
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Feb.
    • R. Rivest, A. Shamir and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. CACM, Vol. 21, Feb. 1978, pages 120-126.
    • (1978) CACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 36
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudi and M. Waidner. Refinement and extension of encrypted key exchange. ACM SIGOPS Oper. Syst. Rev., Vol. 29, 3, pages 22-30, 1995.
    • (1995) ACM SIGOPS Oper. Syst. Rev. , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudi, G.2    Waidner, M.3
  • 38
    • 0020301290 scopus 로고
    • Theory and application of trapdoor functions
    • A.C. Yao. Theory and Application of Trapdoor Functions. In 23rd FOCS, pages 80-91, 1982.
    • (1982) 23rd FOCS , pp. 80-91
    • Yao, A.C.1
  • 39
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A.C. Yao. How to Generate and Exchange Secrets. In 27th FOCS, pages 162-167, 1986.
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.