نتایج جستجو برای: pake

تعداد نتایج: 151  

Journal: :Lecture Notes in Computer Science 2021

In response to standardization requests regarding password-authenticated key exchange (PAKE) protocols, the IRTF working group CFRG has setup a PAKE selection process in 2019, which led of CPace protocol balanced setting, parties share common password. subsequent efforts, further developed, yielding family whose actual security guarantees practical settings are not well understood. this paper, ...

Journal: :IJISP 2009
Xunhua Wang Hua Lin

2010
Vipul Goyal Abhishek Jain Rafail Ostrovsky

The problem of password-authenticated key exchange (PAKE) has been extensively studied for the last two decades. Despite extensive studies, no construction was known for a PAKE protocol that is secure in the plain model in the setting of concurrent self-composition, where polynomially many protocol sessions with the same password may be executed on the distributed network (such as the Internet)...

2010
Kenneth G. Paterson Douglas Stebila

To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time password...

Journal: :IACR Cryptology ePrint Archive 2017
Olivier Blazy Céline Chevalier Paul Germouty

We show how to build a UC-Secure Oblivious Transfer in the presence of Adaptive Corruptions from Quasi-Adaptive Non-Interactive Zero-Knowledge proofs. Our result is based on the work of Jutla and Roy at Asiacrypt 2015, where the authors proposed a constant-size very e cient PAKE scheme. As a stepping stone, we rst show how a twoow PAKE scheme can be generically transformed in an optimized way, ...

2013
Fabrice Benhamouda Olivier Blazy Céline Chevalier David Pointcheval Damien Vergnaud

Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high entropy secret key, that depends on their own passwords only. Following the Gennaro and Lindell’s approach, with a new kind of smooth-projective hash functions (SPHFs), Katz and Vaikuntanathan recently came up with the first concrete one-round PAKE protocols, where the two players just have to send ...

Journal: :IACR Cryptology ePrint Archive 2016
Franziskus Kiefer Mark Manulis

Two-Server Password Authenticated Key Exchange (2PAKE) protocols apply secret sharing techniques to achieve protection against server-compromise attacks. 2PAKE protocols eliminate the need for password hashing and remain secure as long as one of the servers remains honest. This concept has also been explored in connection with two-server password authenticated secret sharing (2PASS) protocols f...

2011
Feng Hao Peter Y.A. Ryan

Feng Hao1 and Peter Y.A. Ryan⋆2 1 S hool of Computing S ien e New astle University feng.hao n l.a .uk 2 Fa ulty of S ien e University of Luxembourg peter.ryan uni.lu Abstra t. This paper explains the syn problem and ompares solutions in Firefox 4 and Chrome 10. The syn problem studies how to se urely syn hronize data a ross di erent omputers. Google has added a built-in syn fun tion in Chrome 1...

Journal: :IEICE Transactions on Information and Systems 2022

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید