Password-Based Authenticated Key Exchange

被引:0
|
作者
Pointcheval, David [1 ,2 ]
机构
[1] ENS, CNRS, UMR 8548, Paris, France
[2] ENS, INRIA, EPI Cascade, Paris, France
来源
关键词
SECURE; 2-PARTY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated Key Exchange protocols enable several parties to establish a shared cryptographically strong key over an insecure network using various authentication means, such as strong cryptographic keys or short (i.e., low-entropy) common secrets. The latter example is definitely the most interesting in practice, since no additional device is required, but just a human-memorable password, for authenticating the players. After the seminal work by Bellovin and Merritt, many settings and security notions have been defined, and many protocols have been proposed, in the two-user setting and in the group setting.
引用
收藏
页码:390 / 397
页数:8
相关论文
共 50 条
  • [31] Password-Based Authenticated Key Exchange without Centralized Trusted Setup
    Yoneyama, Kazuki
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 19 - 36
  • [32] Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework
    Hu, Xuexian
    Liu, Wenfen
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 144 - 153
  • [33] Password-based authenticated key exchange in the three-party setting
    Abdalla, M.
    Fouque, P.-A.
    Pointcheval, D.
    IEE Proceedings: Information Security, 2006, 153 (01): : 27 - 39
  • [34] Efficient password-based authenticated key exchange without public information
    Shao, Jun
    Cao, Zhenfu
    Wang, Licheng
    Lu, Rongxing
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 299 - +
  • [35] Password-Based Authenticated Key Exchange without Centralized Trusted Setup
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (10) : 1142 - 1156
  • [36] A Generic Construction of Tightly Secure Password-Based Authenticated Key Exchange
    Pan, Jiaxin
    Zeng, Runzhi
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT VIII, 2023, 14445 : 143 - 175
  • [37] On password-based authenticated key exchange using collisionful hash functions
    Bakhtiari, S
    Safavi-Naini, R
    Pieprzyk, J
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 299 - 310
  • [38] Password-based authenticated key exchange in the three-party setting
    Abdalla, M
    Fouque, PA
    Pointcheval, D
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 65 - 84
  • [39] Partitioned Group Password-based Authenticated Key Exchange with Privacy Protection
    Zhu, Hongfeng
    Zhang, Yuanle
    Wang, Xueying
    Wang, Liwei
    International Journal of Network Security, 2021, 23 (01) : 116 - 125
  • [40] Password-Based Authenticated Key Exchange from Standard Isogeny Assumptions
    Terada, Shintaro
    Yoneyama, Kazuki
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 41 - 56