نتایج جستجو برای: pake

تعداد نتایج: 151  

2008
P. Y. A. Ryan Peter Y. A. Ryan

Password-Authenticated Key Exchange (PAKE) studies how to establish secure communication between two remote parties solely based on their shared password, without requiring a Public Key Infrastructure (PKI). Despite extensive research in the past decade, this problem remains unsolved. Patent has been one of the biggest brakes in deploying PAKE solutions in practice. Besides, even for the patent...

Journal: :IACR Cryptology ePrint Archive 2007
Xun Yi Raylin Tso Eiji Okamoto

Password-authenticated key exchange (PAKE) protocols are designed to be se-cure even when the secret key used for authentication is a human-memorable password. In thispaper, we consider PAKE protocols in the group scenario, in which a group of clients, each ofthem shares a password with an “honest but curious” server, intend to establish a common secretkey (i.e., a group key) wi...

Journal: :IACR Cryptology ePrint Archive 2017
Xinwei Gao Jintai Ding Lin Li Saraswathy RV Jiqiang Liu

Two post-quantum password-based authenticated key exchange (PAKE) protocols were proposed at CT-RSA 2017. Following this work, we give much more efficient and portable C++ implementation of these two protocols. We also choose more compact parameters providing 200-bit security. Compared with original implementation, we achieve 21.5x and 18.5x speedup for RLWE-PAK and RLWE-PPK respectively. Compa...

Journal: :IACR Cryptology ePrint Archive 2013
Junghyun Nam Kim-Kwang Raymond Choo Juryon Paik Dongho Won

Despite all the research efforts made so far, the design of protocols for password-authenticated key exchange (PAKE) still remains a non-trivial task. One of the major challenges in designing such protocols is to protect low-entropy passwords from the notorious dictionary attacks. In this work, we revisit Abdalla and Pointcheval’s three-party PAKE protocol presented in Financial Cryptography 20...

2017
Charanjit S. Jutla Arnab Roy

We introduce a novel notion of smooth (-verifier) noninteractive zero-knowledge proofs (NIZK) which parallels the familiar notion of smooth projective hash functions (SPHF). We also show that the recent single group element quasi-adaptive NIZK (QA-NIZK) of Jutla and Roy (CRYPTO 2014) for linear subspaces can be easily extended to be computationally smooth. One important distinction of the new n...

2013
Fabrice Benhamouda Olivier Blazy Céline Chevalier David Pointcheval Damien Vergnaud

Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high entropy secret key, that depends on their own passwords only. Following the Gennaro and Lindell's approach, with a new kind of smooth-projective hash functions (SPHFs), Katz and Vaikuntanathan recently came up with the rst concrete one-round PAKE protocols, where the two players just have to send si...

2014
Junghyun Nam Kim-Kwang Raymond Choo Junghwan Kim Hyun-Kyu Kang Jinsoo Kim Juryon Paik Dongho Won

Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider at...

2012
R. Padmavathy

The Password-authenticated key exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. On the other hand, the protocol should resist all types of password guessing attacks, since the password is of low entropy. Recently Lu Cao proposed a simple three-party password based authenticated key exchange (S-3 PAKE) protocol and claim...

2002
Jonathan Katz Rafail Ostrovsky Moti Yung

Password-only authenticated key exchange (PAKE) protocols are designed to be secure even when users choose short, easilyguessed passwords. Security requires, in particular, that the protocol cannot be broken by an o -line dictionary attack in which an adversary enumerates all possible passwords in an attempt to determine the correct one based on previously-viewed transcripts. Recently, provably...

2014
K.ARUN PRASAD SWETHA MURALI

Password-authenticated key exchange (PAKE) is where a client and a server, who share a password, authenticate each other and meanwhile establish a cryptographic key by exchange of messages. The main aim of this project is to authenticate a client, in the scenario where two Peer servers co-operate for Authentication and if one server is compromised, the attacker still cannot pretend to be the cl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید