Threshold password-authenticated key exchange (extended abstract)

被引:0
|
作者
MacKenzie, P
Shrimpton, T
Jakobsson, M
机构
[1] Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
[2] Univ Calif Davis, Dept Elect & Comp Engn, Davis, CA 95616 USA
[3] RSA Labs, RSA Secur Inc, Bedford, MA 01730 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:385 / 400
页数:16
相关论文
共 50 条
  • [31] A general compiler for password-authenticated group key exchange protocol
    Li, Hui
    Wu, Chuan-Kun
    Sun, Jun
    INFORMATION PROCESSING LETTERS, 2010, 110 (04) : 160 - 167
  • [32] Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications
    Li Wenmin
    Wen Qiaoyan
    Su Qi
    Zhang Hua
    Jin Zhengping
    CHINA COMMUNICATIONS, 2012, 9 (01) : 64 - 72
  • [33] ID-Based Group Password-Authenticated Key Exchange
    Yi, Xun
    Tso, Raylin
    Okamoto, Eijo
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 192 - +
  • [34] UC-secure and Contributory Password-Authenticated Group Key Exchange
    Zhang, Lin
    Zhang, Zhenfeng
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 119 - 134
  • [35] Improved client-to-client password-authenticated key exchange protocol
    Gang, Yao
    Dengguo, Feng
    Xiaoxi, Han
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 564 - +
  • [36] Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 102 - 115
  • [37] An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model
    Wei, Fushan
    Ma, Jianfeng
    Zhang, Ruijie
    Ma, Chuangui
    Wang, Xuan
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (07)
  • [38] The relationship between password-authenticated key exchange and other cryptographic primitives
    Nguyen, MH
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 457 - 475
  • [39] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [40] Password authenticated key exchange for resource-constrained wireless communications (extended abstract)
    Wong, DS
    Chan, AH
    Zhu, F
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 827 - 834