scientific article; zbMATH DE number 2009978
From MaRDI portal
Publication:4434897
zbMath1038.94534MaRDI QIDQ4434897
Rosario Gennaro, Yehuda Lindell
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560524.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (40)
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model ⋮ Practical encrypted key agreement using passwords ⋮ A New General Framework for Secure Public Key Encryption with Keyword Search ⋮ Verifier-based anonymous password-authenticated key exchange protocol in the standard model ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Private set intersection: new generic constructions and feasibility results ⋮ Hardware security without secure hardware: how to decrypt with a password and a server ⋮ A general compiler for password-authenticated group key exchange protocol in the standard model ⋮ Adaptive Oblivious Transfer and Generalization ⋮ Structure-Preserving Smooth Projective Hashing ⋮ EKE meets tight security in the universally composable framework ⋮ Identity-based encryption in DDH hard groups ⋮ Password-authenticated key exchange from group actions ⋮ Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions ⋮ Efficient NIZKs for algebraic sets ⋮ Smooth zero-knowledge hash functions ⋮ Smooth projective hashing and two-message oblivious transfer ⋮ Almost tight multi-user security under adaptive corruptions from LWE in the standard model ⋮ Cryptographic group actions and applications ⋮ Fuzzy asymmetric password-authenticated key exchange ⋮ Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World ⋮ Group Encryption ⋮ Cryptanalysis of simple three-party key exchange protocol (S-3PAKE) ⋮ Secure identification and QKD in the bounded-quantum-storage model ⋮ An algebraic framework for Diffie-Hellman assumptions ⋮ Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages ⋮ Simpler session-key generation from short random passwords ⋮ Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol ⋮ A general compiler for password-authenticated group key exchange protocol ⋮ Generic Construction of UC-Secure Oblivious Transfer ⋮ Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues ⋮ Fine-grained cryptography revisited ⋮ Contributory Password-Authenticated Group Key Exchange with Join Capability ⋮ Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework ⋮ Password-authenticated group key establishment from smooth projective hash functions ⋮ One-Round Strong Oblivious Signature-Based Envelope ⋮ Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness ⋮ Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security ⋮ A gapless code-based hash proof system based on RQC and its applications ⋮ Practical post-quantum password-authenticated key exchange based-on module-lattice
This page was built for publication: