Round-Optimal Password-Based Authenticated Key Exchange

被引:0
|
作者
Katz, Jonathan [1 ]
Vaikuntanathan, Vinod [2 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
[2] Microsoft Res, Beijing, Peoples R China
来源
THEORY OF CRYPTOGRAPHY | 2011年 / 6597卷
基金
美国国家科学基金会;
关键词
SECURE; GENERATION; PROTOCOLS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We show a general framework for constructing password-based authenticated key exchange protocols with optimal round complexity - one message per party, sent simultaneously in - the standard model, assuming a common reference string. When our framework is instantiated using bilinear-map cryptosysterns, the resulting protocol is also (reasonably) efficient. Somewhat surprisingly, our framework can be adapted to give protocols in the standard model that are universally composable while still using only one (simultaneous) round.
引用
收藏
页码:293 / +
页数:5
相关论文
共 50 条
  • [41] On password-based authenticated key exchange using collisionful hash functions
    Bakhtiari, S
    Safavi-Naini, R
    Pieprzyk, J
    [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 299 - 310
  • [42] Password-based authenticated key exchange in the three-party setting
    Abdalla, M
    Fouque, PA
    Pointcheval, D
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 65 - 84
  • [43] Partitioned Group Password-based Authenticated Key Exchange with Privacy Protection
    Zhu, Hongfeng
    Zhang, Yuanle
    Wang, Xueying
    Wang, Liwei
    [J]. International Journal of Network Security, 2021, 23 (01) : 116 - 125
  • [44] Password-based Authenticated Key Exchange Scheme Using Smart Card
    Liu Hui
    Zhong Shaojun
    [J]. FIFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2012): COMPUTER VISION, IMAGE ANALYSIS AND PROCESSING, 2013, 8783
  • [45] Cross-Domain Password-Based Authenticated Key Exchange Revisited
    Chen, Liqun
    Lim, Hoon Wei
    Yang, Guomin
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 1052 - 1060
  • [46] Password-Based Authenticated Key Exchange from Standard Isogeny Assumptions
    Terada, Shintaro
    Yoneyama, Kazuki
    [J]. PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 41 - 56
  • [47] A Generic Construction of Tightly Secure Password-Based Authenticated Key Exchange
    Pan, Jiaxin
    Zeng, Runzhi
    [J]. ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT VIII, 2023, 14445 : 143 - 175
  • [48] Efficient three-party password-based authenticated key exchange protocol
    [J]. Xu, C.-X, 1600, Univ. of Electronic Science and Technology of China (41):
  • [49] A General Construction for Password-Based Authenticated Key Exchange from Witness PRFs
    Nan, Jiehui
    Zheng, Mengce
    Wang, Zilong
    Hu, Honggang
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 253 - 267
  • [50] Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol
    Wu, Shuhua
    Chen, Kefei
    Zhu, Yuefei
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (03) : 215 - 221