Universally Composable Password-Based Key Exchange

From MaRDI portal
Publication:5385742

DOI10.1007/11426639_24zbMath1137.94367OpenAlexW1759759811MaRDI QIDQ5385742

Yehuda Lindell, Phil MacKenzie, Ran Canetti, Shai Halevi, Jonathan N. Katz

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_24




Related Items

Multiparty Proximity Testing with Dishonest Majority from Equality TestingSmooth NIZK argumentsUC-secure and Contributory Password-Authenticated Group Key ExchangeVerifier-based anonymous password-authenticated key exchange protocol in the standard modelAsymmetric PAKE with low computation \textit{and} communicationHardware security without secure hardware: how to decrypt with a password and a serverRound-optimal password-based authenticated key exchangeSecurity Analysis of CPaceWireless-channel key exchangeA universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure)Structure-Preserving Smooth Projective HashingRandomized half-ideal cipher on groups with applications to UC (a)PAKEFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemesEKE meets tight security in the universally composable frameworkTwo-server password-only authenticated key exchangeAlgebraic adversaries in the universal composability frameworkCHIP and CRISP: protecting all parties against compromise through identity-binding PAKEsAuditable asymmetric password authenticated public key establishmentSmooth projective hashing and two-message oblivious transferFuzzy asymmetric password-authenticated key exchangePassword Mistyping in Two-Factor-Authenticated Key ExchangeProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldThe IITM model: a simple and expressive model for universal composabilityA Universally Composable Group Key Exchange Protocol with Minimum Communication EffortSecure computation without authenticationComposition of password-based protocolsEfficient UC-Secure Authenticated Key-Exchange for Algebraic LanguagesAuthenticating ad hoc networks by comparison of short digestsRemoving Erasures with Explainable Hash Proof SystemsFaster and Shorter Password-Authenticated Key ExchangeContributory Password-Authenticated Group Key Exchange with Join CapabilityEfficient Two-Party Password-Based Key Exchange Protocols in the UC FrameworkPassword-Authenticated Group Key Agreement with Adaptive Security and ContributivenessGateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger SecurityVirtual Smart Cards: How to Sign with a Password and a ServerUniversally Composable Security Analysis of TLSQuantifying the security cost of migrating protocols to practiceUniversally composable relaxed password authenticated key exchange