搜索结果: 1-15 共查到“密码学 Password-Authenticated Key Exchange”相关记录17条 . 查询时间(0.125 秒)
Separating Standard and Asymmetric Password-Authenticated Key Exchange
PAKE Password-Authenticated Key Exchange
font style='font-size:12px;'>
2019/9/23
Password-Authenticated Key Exchange (PAKE) is a method to establish cryptographic keys between two users sharing a low-entropy password. In its asymmetric version, one of the users acts as a server an...
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error
Key Exchange Three-Party PAKE Lattice
font style='font-size:12px;'>
2017/4/27
Three-party Password Authenticated Key Exchange (3PAKE) protocol is an important cryptographic primitive, where clients can establish a session key using easy-to-remember passwords. A number of 3PAKE ...
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld
Diffie-Hellman Key Exchange Authenticated
font style='font-size:12px;'>
2016/6/3
Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to
establish a high-entropy and secret session key over a insecure communications network.
Password-Authenticated Key Exchange...
On the Security of One Password Authenticated Key Exchange Protocol
cryptographic protocols key establishment PAKE protocols
font style='font-size:12px;'>
2016/1/26
In this paper the Security Evaluated Standardized Password Authenticated Key Exchange
( SESPAKE ) protocol is proposed (this protocol is approved in the standardization
system of the Russian Federat...
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange
password authentication key exchange fault tolerance
font style='font-size:12px;'>
2016/1/23
A threshold password-authenticated key exchange (T-PAKE) protocol allows a set of n servers to collectively authenticate a client with a human-memorizable password such that any subset of size great...
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
cryptographic protocols optimal way
font style='font-size:12px;'>
2016/1/4
In this paper, we study Password Authenticated Key Exchange (PAKE) in a group. First, we present a generic
“fairy-ring dance” construction that transforms any secure two-party PAKE scheme to a group ...
Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions
Multi-linear maps smooth projective hash functions authentication key exchange
font style='font-size:12px;'>
2014/3/5
While password-authenticated key exchange (or PAKE) protocols have been deeply studied, a server corruption remains the main threat, with many concrete cases nowadays. Verifier-based PAKE (or VPAKE) p...
One-time-password-authenticated key exchange
One-time-password-authenticated key exchange
font style='font-size:12px;'>
2009/9/11
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive
industries are deploying one-time password systems, where users have many passwords and use each...
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
password authentication key exchange PAKE
font style='font-size:12px;'>
2009/6/11
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated
key exchange (PAKE) protocol and its threshold construction both of which are designed for client’s
password-ba...
Multi-Factor Password-Authenticated Key Exchange
passwords authentication, key exchange multi-factor
font style='font-size:12px;'>
2009/6/4
We consider a new form of authenticated key exchange which we call multi-factor password-
authenticated key exchange, where session establishment depends on successful authentication
of multiple sho...
ID-Based Group Password-Authenticated Key Exchange
Group key agreement protocol compiler password-authenticated key exchange
font style='font-size:12px;'>
2009/6/2
Password-authenticated key exchange (PAKE) protocols are designed to be secure
even when the secret key used for authentication is a human-memorable password. In this
paper, we consider PAKE protoco...
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Secure Password-Authenticated Key Exchange Diffie-Hellman
font style='font-size:12px;'>
2009/4/17
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman.
On the Security of the SPEKE Password-Authenticated Key Exchange Protocol
Security SPEKE Password-Authenticated Key Exchange Protocol
font style='font-size:12px;'>
2009/4/16
On the Security of the SPEKE Password-Authenticated Key Exchange Protocol.
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
Efficient Password-Authenticated Key Exchange Human-Memorable Passwords
font style='font-size:12px;'>
2009/4/16
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords.
Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions
Pretty-Simple Password-Authenticated Key-Exchange Standard Assumptions
font style='font-size:12px;'>
2009/4/8
In this paper, we propose a pretty-simple password-authenticated
key-exchange protocol, which is proven to be secure in the standard
model under the following three assumptions. (1) DDH (Decision Di...