Round-Optimal Password-Based Authenticated Key Exchange
From MaRDI portal
Publication:3000545
DOI10.1007/978-3-642-19571-6_18zbMath1295.94089OpenAlexW1537652141MaRDI QIDQ3000545
Vinod Vaikuntanathan, Jonathan N. Katz
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_18
Related Items (26)
Smooth NIZK arguments ⋮ A New General Framework for Secure Public Key Encryption with Keyword Search ⋮ Verifier-based anonymous password-authenticated key exchange protocol in the standard model ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Hardware security without secure hardware: how to decrypt with a password and a server ⋮ Adaptive Oblivious Transfer and Generalization ⋮ Structure-Preserving Smooth Projective Hashing ⋮ EKE meets tight security in the universally composable framework ⋮ Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions ⋮ Smooth zero-knowledge hash functions ⋮ CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs ⋮ Shorter quasi-adaptive NIZK proofs for linear subspaces ⋮ Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption ⋮ Fuzzy asymmetric password-authenticated key exchange ⋮ Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ An algebraic framework for Diffie-Hellman assumptions ⋮ Removing Erasures with Explainable Hash Proof Systems ⋮ Uniqueness of \(DP\)-Nash subgraphs and \(D\)-sets in weighted graphs of Netflix games ⋮ Generic Construction of UC-Secure Oblivious Transfer ⋮ Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs ⋮ Fine-grained cryptography revisited ⋮ One-Round Strong Oblivious Signature-Based Envelope ⋮ Universally composable relaxed password authenticated key exchange ⋮ A gapless code-based hash proof system based on RQC and its applications ⋮ Practical post-quantum password-authenticated key exchange based-on module-lattice
This page was built for publication: Round-Optimal Password-Based Authenticated Key Exchange