نتایج جستجو برای: pake

تعداد نتایج: 151  

2017
Youngsook Lee Juryon Paik Younsung Choi

Password-only authenticated key exchange (PAKE) protocols allow to generate cryptographically strong keys from humanmemorable passwords. The design of an efficient PAKE protocol is difficult, especially in the three-party setting where dictionary attacks by malicious insiders are a major concern. The difficulty is well illustrated by the fact that after twenty years of research, only a handful ...

2004
Zhiguo Wan Shuhong Wang

In large-scale client-client communication environments, Password-Authenticated Key Exchange (PAKE) based on trusted server is very convenient in key management. For enhancing the efficiency and preventing various attacks, Wang and Mo proposed a three-PAKE protocol, Yoon and Yoo proposed a C2C-PAKE protocol. However, in this paper, we show that the Wang-Mo protocol and the Yoon-Yoo protocol exi...

Journal: :IACR Cryptology ePrint Archive 2007
Fengjiao Wang Yuqing Zhang

Cross realm client-to-client password authenticated key exchange (C2C-PAKE) schemes are designed to enable two clients in different realms to agree on a common session key using different passwords. In 2006, Yin-Bao presented the first provably secure cross-realm C2C-PAKE, which security is proven rigorously within a formally defined security model and based on the hardness of some computationa...

2006
Craig Gentry Philip D. MacKenzie Zulfikar Ramzan

This paper considers the problem of password-authenticated key exchange (PAKE) in a client-server setting, where the server authenticates using a stored password file, and it is desirable to maintain some degree of security even if the server is compromised. A PAKE scheme is said to be resilient to server compromise if an adversary who compromises the server must at least perform an offline dic...

Journal: :IACR Cryptology ePrint Archive 2017
José Becerra Petra Sala Marjan Skrobot

Password Authenticated Key Exchange (PAKE) allows a user to establish a strong cryptographic key with a server, using only knowledge of a pre-shared password. One of the basic security requirements of PAKE is to prevent offline dictionary attacks. In this paper, we revisit zkPAKE, an augmented PAKE that has been recently proposed by Mochetti, Resende, and Aranha (SBSeg 2015). Our work shows tha...

Journal: :Symmetry 2014
Junghyun Nam Kim-Kwang Raymond Choo Sangchul Han Juryon Paik Dongho Won

We present the first provably-secure three-party password-only authenticated key exchange (PAKE) protocol that can run in only two communication rounds. Our protocol is generic in the sense that it can be constructed from any two-party PAKE protocol. The protocol is proven secure in a variant of the widely-accepted model of Bellare, Pointcheval and Rogaway (2000) without any idealized assumptio...

Journal: :Electr. Notes Theor. Comput. Sci. 2008
Zhoujun Li Hua Guo Xiyong Zhang

Client-to-client password authenticated key exchange (C2C-PAKE) protocol enables two clients who only share their passwords with their own servers to establish a shared key for their secure communications. Recently, Byun et al. and Yin-Li respectively proposed first provably secure C2C-PAKE protocols. However, both protocols are found to be vulnerable to undetectable online dictionary attacks a...

Journal: :I. J. Network Security 2015
Mohsen Toorani

Password-authenticated key exchange (PAKE) protocols enable two or more entities to authenticate each other and share a strong cryptographic key based on a pre-shared human memorable password. In this paper, we present several attacks on two recent elliptic curve-based PAKE protocols that have been suggested for use in body area networks and smart environments. A variant of the first PAKE proto...

2006
Jin Wook Byun Dong Hoon Lee Jongin Lim

We study client-to-client password-authenticated key exchange (C2C-PAKE) enabling two clients in different realms to agree on a common session key using different passwords. Byun et al. first presented C2C-PAKE schemes under the cross-realm setting. However, the schemes were not formally treated, and subsequently found to be flawed. In addition, in the schemes, there are still rooms for improve...

2006
Jeong Ok Kwon Kouichi Sakurai Dong Hoon Lee

Password-authenticated key exchange (PAKE) for two-party allows a client and a server communicating over a public network to share a session key using a human-memorable password only. PAKE protocols can be served as basic building blocks for constructing secure, complex, and higher-level protocols which were initially built upon the Transport Layer Security (TLS) protocol. In this paper, we pro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید