Threshold password-authenticated key exchange: (Extended abstract)
暂无分享,去创建一个
Markus Jakobsson | Thomas Shrimpton | Philip D. MacKenzie | M. Jakobsson | P. MacKenzie | Thomas Shrimpton
[1] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[2] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[3] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[4] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[5] Shirley Dex,et al. JR 旅客販売総合システム(マルス)における運用及び管理について , 1991 .
[6] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[7] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[8] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, EUROCRYPT.
[9] David P. Jablon. Password Authentication Using Multiple Servers , 2001, CT-RSA.
[10] Rafail Ostrovsky,et al. Robust Non-interactive Zero Knowledge , 2001, CRYPTO.
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[13] Thomas D. Wu. The Secure Remote Password Protocol , 1998, NDSS.
[14] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[15] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[16] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[17] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[18] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[19] David P. Jablon. Strong password-only authenticated key exchange , 1996, CCRV.
[20] Rafail Ostrovsky,et al. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords , 2001, EUROCRYPT.
[21] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[22] Burton S. Kaliski,et al. Server-assisted generation of a strong secret from a password , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).
[23] Sarvar Patel,et al. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.