Round-optimal password-based authenticated key exchange
From MaRDI portal
Publication:380962
DOI10.1007/s00145-012-9133-6zbMath1283.94094OpenAlexW2071265330WikidataQ114692958 ScholiaQ114692958MaRDI QIDQ380962
Vinod Vaikuntanathan, Jonathan N. Katz
Publication date: 15 November 2013
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6402
Related Items (2)
A general compiler for password-authenticated group key exchange protocol in the standard model ⋮ Password-authenticated group key establishment from smooth projective hash functions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Two-server password-only authenticated key exchange
- Secure computation without authentication
- Session-key generation using human passwords only
- Simpler session-key generation from short random passwords
- Efficient Password Authenticated Key Exchange via Oblivious Transfer
- Efficient and secure authenticated key exchange using weak passwords
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Password-Authenticated Session-Key Generation on the Internet in the Plain Model
- Secure Hybrid Encryption from Weakened Key Encapsulation
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
- New directions in cryptography
- Noninteractive Zero-Knowledge
- Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions
- Applied Cryptography and Network Security
- Advances in Cryptology – CRYPTO 2004
- Secure Remote Authentication Using Biometric Data
- Universally Composable Password-Based Key Exchange
- Faster and Shorter Password-Authenticated Key Exchange
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
- Selected Areas in Cryptography
This page was built for publication: Round-optimal password-based authenticated key exchange