نتایج جستجو برای: pake
تعداد نتایج: 151 فیلتر نتایج به سال:
Recent advances in quantum technology and the potential that practical computers may become a reality future have led to renewed interest developing cryptographic technologies are secure against conventional attacks. Currently, virtually all asymmetric schemes use threatened by development of powerful computers. Post-quantum cryptography is one main ways combat this threat. Its security based o...
We present TOPPSS, the most efficient Password-Protected Secret Sharing (PPSS) scheme to date. A (t, n)-threshold PPSS, introduced by Bagherzandi et al. [4], allows a user to share a secret among n servers so that the secret can later be reconstructed by the user from any subset of t+ 1 servers with the sole knowledge of a password. It is guaranteed that any coalition of up to t corrupt servers...
Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to establish a high-entropy and secret session key over a insecure communications network. Password-Authenticated Key Exchange (PAKE) assumes that the parties in play share a simple password, which is cheap and human-memorable and is used to achieve the authentication. PAKEs are practically relevant as these features are ex...
-Si lanol groups in protonated magadiite (H-magadiite) were characterized by IH and 2H solidstate nuclear magnetic resonance (NMR). H-magadiite and deuterated (D) magadiite were synthesized by the treatment of Na-rich magadiite with 0.2 N HCI and 0.2 N DC1, respectively. In the IH NMR spectrum measured at room temperature, silanol groups of H-magadiite showed two signals at 3.75 and 5.70 ppm, i...
In this paper the Security Evaluated Standardized Password Authenticated Key Exchange ( SESPAKE ) protocol is proposed (this protocol is approved in the standardization system of the Russian Federation) and its cryptographic properties are analyzed. The SESPAKE protocol includes a key agreement step and a key authentication step. We define new indistinguishability-based adversary model with a t...
Deciding which security model is the right one for Authenticated Key Exchange (AKE) is well-known to be a difficult problem. In this paper, we examine definitions of security for Password-AKE (PAKE) in the style proposed by Bellare et al. [5] at Eurocrypt 2000. Indeed, there does not seem to be any consensus, even when narrowing the study down to this particular authentication method and model ...
The area of password-based authenticated key establishment protocols has been the subject of a vast amount of work in the last few years due to its practical aspects. Despite the attention given to it, most passwordauthenticated key establishment (PAKE) schemes in the literature consider authentication between a client and a sever. Although some of them are extended to a threeparty PAKE protoco...
Smooth projective hashing has proven to be an extremely useful primitive, in particular when used in conjunction with commitments to provide implicit decommitment. This has lead to applications proven secure in the UC framework, even in presence of an adversary which can do adaptive corruptions, like for example Password Authenticated Key Exchange (PAKE), and 1-out-of-m Oblivious Transfer (OT)....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید