Round-optimal password-based authenticated key exchange
From MaRDI portal
Publication:3000545
DOI10.1007/978-3-642-19571-6_18zbMATH Open1295.94089OpenAlexW1537652141MaRDI QIDQ3000545FDOQ3000545
Jonathan Katz, Vinod Vaikuntanathan
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_18
Recommendations
- Round-optimal password-based authenticated key exchange
- Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model
- Universally Composable Password-Based Key Exchange
- scientific article; zbMATH DE number 2009978
- Efficient password-based authenticated key exchange protocol in the UC framework
Cited In (38)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- A gapless code-based hash proof system based on RQC and its applications
- Removing Erasures with Explainable Hash Proof Systems
- Fine-grained cryptography revisited
- Efficient Password-Authenticated Key Exchange Based on RSA
- Public Key Cryptography - PKC 2006
- Generic Construction of UC-Secure Oblivious Transfer
- A New General Framework for Secure Public Key Encryption with Keyword Search
- Adaptive Oblivious Transfer and Generalization
- Strong authenticated key exchange with auxiliary inputs
- Almost Optimal Oblivious Transfer from QA-NIZK
- Smooth NIZK arguments
- Uniqueness of \(DP\)-Nash subgraphs and \(D\)-sets in weighted graphs of Netflix games
- CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs
- Smooth zero-knowledge hash functions
- Verifier-based anonymous password-authenticated key exchange protocol in the standard model
- Hardware security without secure hardware: how to decrypt with a password and a server
- One-Round Strong Oblivious Signature-Based Envelope
- Relatively-Sound NIZKs and Password-Based Key-Exchange
- Universally composable relaxed password authenticated key exchange
- Round-Optimal Contributory Conference Key Agreement
- Structure-Preserving Smooth Projective Hashing
- An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings
- Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs
- Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World
- Oblivious PAKE: efficient handling of password trials
- Shorter quasi-adaptive NIZK proofs for linear subspaces
- EKE meets tight security in the universally composable framework
- Practical post-quantum password-authenticated key exchange based-on module-lattice
- Fuzzy asymmetric password-authenticated key exchange
- A gapless post-quantum hash proof system in the Hamming metric
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
- Compact password authenticated key exchange from group actions
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
- Universally Composable Password-Based Key Exchange
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
- An algebraic framework for Diffie-Hellman assumptions
- Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model
This page was built for publication: Round-optimal password-based authenticated key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000545)