A Method for Making Password-Based Key Exchange Resilient to Server Compromise
From MaRDI portal
Publication:5756641
DOI10.1007/11818175_9zbMATH Open1161.68440OpenAlexW1490181591MaRDI QIDQ5756641FDOQ5756641
Authors: Craig Gentry, Zulfikar Ramzan, Philip MacKenzie
Publication date: 4 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11818175_9
Recommendations
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)
- Applied Cryptography and Network Security
- scientific article; zbMATH DE number 2009978
- Efficient and secure authenticated key exchange using weak passwords
- Password-based authenticated key exchange
- An Efficient Password-Only Two-Server Authenticated Key Exchange System
- Password-based authenticated key exchange: an overview
- Computational Science and Its Applications – ICCSA 2004
- scientific article; zbMATH DE number 1617939
Cited In (19)
- An efficient strong asymmetric PAKE compiler instantiable from group actions
- Contributory password-authenticated group key exchange with join capability
- Smooth NIZK arguments
- CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs
- The twin Diffie-Hellman problem and applications
- Security analysis of the WhatsApp end-to-end encrypted backup protocol
- A universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure)
- Universally composable relaxed password authenticated key exchange
- KHAPE: Asymmetric PAKE from key-hiding key exchange
- Asymmetric PAKE with low computation \textit{and} communication
- Password-authenticated TLS via OPAQUE and post-handshake authentication
- EKE meets tight security in the universally composable framework
- Bare PAKE: universally composable key exchange from just passwords
- Latke: a framework for constructing identity-binding PAKEs
- Fuzzy asymmetric password-authenticated key exchange
- Universally composable relaxed asymmetric password-authenticated key exchange
- How to obfuscate MPC inputs
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
- Password-based credentials with security against server compromise
This page was built for publication: A Method for Making Password-Based Key Exchange Resilient to Server Compromise
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5756641)