Provably secure three-party password-based authenticated key exchange protocol
From MaRDI portal
Recommendations
- Secure verifier-based three-party key exchange in the random oracle model
- How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols
- Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols
- scientific article; zbMATH DE number 6719494
- Public Key Cryptography - PKC 2005
Cites work
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 4195167 (Why is no real title available?)
- scientific article; zbMATH DE number 503255 (Why is no real title available?)
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 1952887 (Why is no real title available?)
- scientific article; zbMATH DE number 2086895 (Why is no real title available?)
- A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
- Applied Cryptography and Network Security
- Applied Cryptography and Network Security
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Authenticated key exchange secure against dictionary attacks
- Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
- Cryptography. Theory and practice
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
- Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)
- Efficient verifier-based key agreement protocol for three parties without server's public key
- Enhanced password-based simple three-party key exchange protocol
- Financial Cryptography and Data Security
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
- Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
- Public Key Cryptography - PKC 2005
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Stronger Security of Authenticated Key Exchange
- The Random Oracle Model and the Ideal Cipher Model Are Equivalent
- The Twin Diffie-Hellman Problem and Applications
- Topics in Cryptology – CT-RSA 2005
- Validation of Elliptic Curve Public Keys
Cited in
(19)- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- Provably secure three-party password-based authenticated key exchange from RLWE
- Improved verifier-based three-party password-authenticated key exchange protocol
- scientific article; zbMATH DE number 6719494 (Why is no real title available?)
- Public Key Cryptography - PKC 2005
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
- Secure verifier-based three-party key exchange in the random oracle model
- Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
- Two-round password-only authenticated key exchange in the three-party setting
- AUTHENTICATED TRIPARTITE KEY AGREEMENT PROTOCOL USING DIGITAL SIGNATURE ALGORITHM
- Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves
- How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols
- Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting
- Simple password-based three-party authenticated key exchange without server public keys
- Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
- Provably secure three party encrypted key exchange scheme with explicit authentication
- A reduction-based proof for authentication and session key security in three-party Kerberos
- A rational framework for secure communication
- Financial Cryptography and Data Security
This page was built for publication: Provably secure three-party password-based authenticated key exchange protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q425526)