Round-Optimal Password-Based Authenticated Key Exchange

From MaRDI portal
Revision as of 22:10, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3000545

DOI10.1007/978-3-642-19571-6_18zbMath1295.94089OpenAlexW1537652141MaRDI QIDQ3000545

Vinod Vaikuntanathan, Jonathan N. Katz

Publication date: 19 May 2011

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_18




Related Items (26)

Smooth NIZK argumentsA New General Framework for Secure Public Key Encryption with Keyword SearchVerifier-based anonymous password-authenticated key exchange protocol in the standard modelStrong authenticated key exchange with auxiliary inputsHardware security without secure hardware: how to decrypt with a password and a serverAdaptive Oblivious Transfer and GeneralizationStructure-Preserving Smooth Projective HashingEKE meets tight security in the universally composable frameworkCryptographic Reverse Firewall via Malleable Smooth Projective Hash FunctionsSmooth zero-knowledge hash functionsCHIP and CRISP: protecting all parties against compromise through identity-binding PAKEsShorter quasi-adaptive NIZK proofs for linear subspacesSubvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryptionFuzzy asymmetric password-authenticated key exchangeProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsAn algebraic framework for Diffie-Hellman assumptionsRemoving Erasures with Explainable Hash Proof SystemsUniqueness of \(DP\)-Nash subgraphs and \(D\)-sets in weighted graphs of Netflix gamesGeneric Construction of UC-Secure Oblivious TransferPractical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofsFine-grained cryptography revisitedOne-Round Strong Oblivious Signature-Based EnvelopeUniversally composable relaxed password authenticated key exchangeA gapless code-based hash proof system based on RQC and its applicationsPractical post-quantum password-authenticated key exchange based-on module-lattice




This page was built for publication: Round-Optimal Password-Based Authenticated Key Exchange