نتایج جستجو برای: PAKE

تعداد نتایج: 151  

2015
Franziskus Kiefer Mark Manulis

In this work we introduce the notion of Oblivious Password based Authenticated Key Exchange (O-PAKE) and a compiler to transform a large class of PAKE into O-PAKE protocols. O-PAKE allows a client that shares one password with a server to use a subset of passwords within one PAKE session. It succeeds if and only if one of those input passwords matches the one stored on the server side. The term...

Journal: :IACR Cryptology ePrint Archive 2013
Franziskus Kiefer Mark Manulis

An often neglected problem for potential practical adoption of Password-based Authenticated Key Exchange (PAKE) protocols on the Internet is the handling of failed password trials. Unlike the currently used approach, where a server-authenticated TLS channel (involving constant number of public key-based operations on both sides) is set up once and can then be used by the client to try a limited...

2014
Junghyun Nam Kim-Kwang Raymond Choo Juryon Paik Dongho Won

While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary a...

2016
Jean Lancrenon Marjan Skrobot Qiang Tang

Recently, the password-authenticated key exchange protocol J-PAKE of Hao and Ryan (Workshop on Security Protocols 2008) was formally proven secure in the algebraic adversary model by Abdalla et al. (IEEE S&P 2015). In this paper, we propose and examine two variants of J-PAKE which we call RO-J-PAKE and CRS-J-PAKE that each makes the use of two less zero-knowledge proofs than the original protoc...

2017
Rakyong Choi Kwangjo Kim

Password-based Authenticated Key Exchange (PAKE) protocol assumes that the parties share a low-entropy, easy-to-remember password to achieve the authentication with a high-entropy session key. PAKE protocols can be employed to hand-held devices for access control of sensitive personal data remotely. For communication with more than one user, the user needs to remember all passwords between othe...

Journal: :World Journal of English Language 2023

This study aims to pinpoint the variations in Adverb Phrase ‘As well’ initial position PakE, and investigate influence of substrate linguistic effect Urdu language on PakE. For this study, a corpus GlowbE-PK was utilized. In total, 192 phrases sentence were found. utilized mixed method research also kept view Sociolinguistic Variation World Englishes conventions research.The number frequency to...

Journal: :Physics Today 2004

Journal: :Computer Standards & Interfaces 2007
Jeong Ok Kwon Ik Rae Jeong Kouichi Sakurai Dong Hoon Lee

In the last few years, researchers have extensively studied the password-authenticated key exchange (PAKE) in the three-party setting. The fundamental security goal of PAKE is security against dictionary attacks. The protocols for verifier-based PAKE are additionally required to be secure against server compromise. Some verifier-based PAKE schemes in the three-party setting have been suggested ...

2014
S. Bhuvanesh

Two server password-based authentication protocols (Two-Server PAKE), where two servers co-operate to authenticate a client on the basis of Password only and if one server is compromised due to Insider Attack or Distributed Denial Of Service Attack (DDOS). In Asymmetric two-server PAKE protocol runs in series and only the front-end server and the client need to establish a secret session key. I...

2017
Jiang Zhang Yu Yu

Password-based authenticated key exchange (PAKE) enables two users with shared low-entropy passwords to establish cryptographically strong session keys over insecure networks. At Asiacrypt 2009, Katz and Vaikuntanathan showed a generic three-round PAKE based on any CCA-secure PKE with associated approximate smooth projective hashing (ASPH), which helps to obtain the first PAKE from lattices. In...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید