Sciweavers

19 search results - page 1 / 4
» Password-Based Group Key Exchange Secure Against Insider Gue...
Sort
View
CIS
2005
Springer
13 years 10 months ago
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks
Jin Wook Byun, Dong Hoon Lee, Jongin Lim
JOC
2007
133views more  JOC 2007»
13 years 4 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
ASIACRYPT
2009
Springer
13 years 11 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 4 months ago
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed unde...
Colin Boyd, Juan Manuel González Nieto, M. ...
CCS
2008
ACM
13 years 6 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis