Two-server password-only authenticated key exchange
From MaRDI portal
Publication:414937
DOI10.1016/J.JCSS.2011.09.005zbMATH Open1277.94059OpenAlexW2043188413WikidataQ114666166 ScholiaQ114666166MaRDI QIDQ414937FDOQ414937
Authors: Gelareh Taban, Virgil Gligor, Jonathan Katz, Philip MacKenzie
Publication date: 11 May 2012
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jcss.2011.09.005
Recommendations
Cites Work
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- Title not available (Why is that?)
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- The random oracle methodology, revisited.
- Authenticated key exchange secure against dictionary attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Provably secure threshold password-authenticated key exchange
- Title not available (Why is that?)
- Title not available (Why is that?)
- Universally Composable Password-Based Key Exchange
- Session-key generation using human passwords only
- Threshold password-authenticated key exchange
- Title not available (Why is that?)
- Title not available (Why is that?)
- An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
- Topics in Cryptology – CT-RSA 2005
Cited In (23)
- Provably secure threshold password-authenticated key exchange
- Credential authenticated identification and key exchange
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Two-Server Password-Only Authenticated Key Exchange
- Topics in Cryptology – CT-RSA 2005
- A strong provably secure IBE scheme without bilinear map
- Two-factor authentication with end-to-end password security
- SPP: An anti-phishing single password protocol
- Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
- Threshold password-authenticated key exchange
- An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
- Light-weight key exchange with different passwords in the standard model
- Title not available (Why is that?)
- Provably secure three party encrypted key exchange scheme with explicit authentication
- Theory of Cryptography
- Password Mistyping in Two-Factor-Authenticated Key Exchange
- Applied Cryptography and Network Security
- An Efficient Password-Only Two-Server Authenticated Key Exchange System
- Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
- Round-optimal password-based authenticated key exchange
- An Inter-domain Key Agreement Protocol Using Weak Passwords
This page was built for publication: Two-server password-only authenticated key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q414937)