Universally Composable Password-Based Key Exchange
From MaRDI portal
Publication:5385742
DOI10.1007/11426639_24zbMath1137.94367OpenAlexW1759759811MaRDI QIDQ5385742
Yehuda Lindell, Phil MacKenzie, Ran Canetti, Shai Halevi, Jonathan N. Katz
Publication date: 6 May 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11426639_24
Related Items
Multiparty Proximity Testing with Dishonest Majority from Equality Testing ⋮ Smooth NIZK arguments ⋮ UC-secure and Contributory Password-Authenticated Group Key Exchange ⋮ Verifier-based anonymous password-authenticated key exchange protocol in the standard model ⋮ Asymmetric PAKE with low computation \textit{and} communication ⋮ Hardware security without secure hardware: how to decrypt with a password and a server ⋮ Round-optimal password-based authenticated key exchange ⋮ Security Analysis of CPace ⋮ Wireless-channel key exchange ⋮ A universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure) ⋮ Structure-Preserving Smooth Projective Hashing ⋮ Randomized half-ideal cipher on groups with applications to UC (a)PAKE ⋮ FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes ⋮ EKE meets tight security in the universally composable framework ⋮ Two-server password-only authenticated key exchange ⋮ Algebraic adversaries in the universal composability framework ⋮ CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs ⋮ Auditable asymmetric password authenticated public key establishment ⋮ Smooth projective hashing and two-message oblivious transfer ⋮ Fuzzy asymmetric password-authenticated key exchange ⋮ Password Mistyping in Two-Factor-Authenticated Key Exchange ⋮ Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World ⋮ The IITM model: a simple and expressive model for universal composability ⋮ A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort ⋮ Secure computation without authentication ⋮ Composition of password-based protocols ⋮ Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages ⋮ Authenticating ad hoc networks by comparison of short digests ⋮ Removing Erasures with Explainable Hash Proof Systems ⋮ Faster and Shorter Password-Authenticated Key Exchange ⋮ Contributory Password-Authenticated Group Key Exchange with Join Capability ⋮ Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework ⋮ Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness ⋮ Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security ⋮ Virtual Smart Cards: How to Sign with a Password and a Server ⋮ Universally Composable Security Analysis of TLS ⋮ Quantifying the security cost of migrating protocols to practice ⋮ Universally composable relaxed password authenticated key exchange