搜索结果: 1-15 共查到“密码学 J-PAKE”相关记录15条 . 查询时间(0.046 秒)
Strong Asymmetric PAKE based on Trapdoor CKEM
PAKE ROM
font style='font-size:12px;'>
2019/6/5
Password-Authenticated Key Exchange (PAKE) protocols allow two parties that share a password to establish a shared key in a way that is immune to oine attacks. Asymmetric PAKE (aPAKE) [21] adapts thi...
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks
Password authentication key exchange PAKE
font style='font-size:12px;'>
2018/3/7
Password-Authenticated Key Exchange (PAKE) protocols allow two parties that only share a password to establish a shared key in a way that is immune to offline attacks. Asymmetric PAKE (aPAKE) strength...
Two-Round PAKE from Approximate SPH and Instantiations from Lattices
PAKE ASPH
font style='font-size:12px;'>
2017/9/4
Password-based authenticated key exchange (PAKE) enables two users with shared low-entropy passwords to establish cryptographically strong session keys over insecure networks. At Asiacrypt 2009, Katz ...
Universally Composable Two-Server PAKE
PAKE Universal Composability Smooth Projective Hashing
font style='font-size:12px;'>
2016/5/30
Two-Server Password Authenticated Key Exchange (2PAKE) protocols apply secret sharing
techniques to achieve protection against server-compromise attacks. 2PAKE protocols eliminate
the need for passw...
Blind Password Registration for Verifier-based PAKE
blind password registration verifier-based PAKE
font style='font-size:12px;'>
2016/5/9
We propose Blind Password Registration (BPR), a new class of cryptographic protocols that is instrumental for secure registration of client passwords at remote servers with additional protection again...
Two More Efficient Variants of the J-PAKE Protocol
Password-authenticated key exchange J-PAKE Efficiency
font style='font-size:12px;'>
2016/4/15
Recently, the password-authenticated key exchange protocol J-PAKE of Hao and Ryan (Workshop on Security Protocols 2008) was formally proven secure in the algebraic adversary model by Abdalla et al.(IE...
Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE
UC-PAKE bilinear pairings SXDH
font style='font-size:12px;'>
2016/3/4
We introduce a novel notion of smooth (-verifier) non- interactive
zero-knowledge proofs (NIZK) which parallel the familiar notion of
smooth projective hash functions (SPHF). We also show that the r...
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE
Password policies password registration authentication
font style='font-size:12px;'>
2016/1/23
Zero-Knowledge Password Policy Checks (ZKPPC), introduced in this work, enable blind registration of client passwords at remote servers, i.e., client passwords are never transmitted to the servers. ...
Distributed Smooth Projective Hashing and its Application to Two-Server PAKE
Smooth Projective Hash Functions Two-Server PAKE
font style='font-size:12px;'>
2016/1/9
Smooth projective hash functions have been used as building block for various cryptographic
applications, in particular for password-based authentication.
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
password authentication secret sharing
font style='font-size:12px;'>
2016/1/7
In a Password-Protected Secret Sharing (PPSS) scheme with parameters (t, n) (formalized
by Bagherzandi et al. [2]), a user Alice stores secret information s among n servers so that she
can later rec...
Dual-System Simulation-Soundness with Applications to UC-PAKE and More
Dual-System Simulation-Soundness two-tier proof system
font style='font-size:12px;'>
2016/1/6
We introduce a novel concept of dual-system simulation-sound non-interactive zero-knowledge
(NIZK) proofs. Dual-system NIZK proof system can be seen as a two-tier proof system. As opposed
to the usu...
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
Authenticated Key Exchange Blind Signatures Smooth Projective Hash Functions
font style='font-size:12px;'>
2016/1/3
Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high entropy secret key, that depends on their own passwords only. Following the Gennaro and Lindell's appro...
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM
PAKE IBPAKE IBE
font style='font-size:12px;'>
2015/12/29
In this paper, we propose an efficient identity-based password
authenticated key exchange (IBPAKE) protocol using identitybased
KEM/DEM. In IBPAKE, a client conducts authentication based
on a human...
Oblivious PAKE and Efficient Handling of Password Trials
cryptographic protocols / Password Based Authenticated Key Exchange
font style='font-size:12px;'>
2013/4/18
An often neglected problem for potential practical adoption of Password-based Authenticated Key Exchange (PAKE) protocols on the Internet is the handling of failed password trials. Unlike the currentl...
A New Security Model for Cross-Realm C2C-PAKE Protocol
Password-authenticated key exchange cross realm client-to-client provably secure
font style='font-size:12px;'>
2008/8/11
Cross realm client-to-client password authenticated key exchange (C2C-PAKE) schemes are designed to enable two clients in different realms to agree on a common session key using different passwords. I...