A Method for Making Password-Based Key Exchange Resilient to Server Compromise
From MaRDI portal
Publication:5756641
DOI10.1007/11818175_9zbMath1161.68440OpenAlexW1490181591MaRDI QIDQ5756641
Zulfikar Ramzan, Craig Gentry, Philip D. MacKenzie
Publication date: 4 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11818175_9
Related Items (14)
Smooth NIZK arguments ⋮ KHAPE: Asymmetric PAKE from key-hiding key exchange ⋮ Asymmetric PAKE with low computation \textit{and} communication ⋮ A universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure) ⋮ Password-authenticated TLS via OPAQUE and post-handshake authentication ⋮ EKE meets tight security in the universally composable framework ⋮ How to obfuscate MPC inputs ⋮ CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs ⋮ Security analysis of the WhatsApp end-to-end encrypted backup protocol ⋮ Fuzzy asymmetric password-authenticated key exchange ⋮ Contributory Password-Authenticated Group Key Exchange with Join Capability ⋮ Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework ⋮ The twin Diffie-Hellman problem and applications ⋮ Universally composable relaxed password authenticated key exchange
This page was built for publication: A Method for Making Password-Based Key Exchange Resilient to Server Compromise