Sciweavers

53 search results - page 3 / 11
» Provably Secure Threshold Password-Authenticated Key Exchang...
Sort
View
ASIACRYPT
2000
Springer
13 years 10 months ago
Password-Authenticated Key Exchange Based on RSA
Abstract. There have been many proposals in recent years for passwordauthenticated key exchange protocols. Many of these have been shown to be insecure, and the only ones that seem...
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
13 years 11 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
AINA
2007
IEEE
14 years 13 days ago
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients
We propose a four-party password authenticated interdomain key exchange protocol which makes use of properties of identity-based cryptography and secret public keys. Being passwor...
Ford-Long Wong, Hoon Wei Lim
TCC
2007
Springer
145views Cryptology» more  TCC 2007»
14 years 5 days ago
(Password) Authenticated Key Establishment: From 2-Party to Group
Abstract. A protocol compiler is described, that transforms any provably secure authenticated 2-party key establishment into a provably secure authenticated group key establishment...
Michel Abdalla, Jens-Matthias Bohli, Maria Isabel ...
ADHOC
2007
134views more  ADHOC 2007»
13 years 5 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu