VSPAKE: Provably secure verifier-based PAKE protocol for client/server model in TLS ciphersuite

M Qi - Journal of Systems Architecture, 2024 - Elsevier
Nowadays, password-authenticated key exchange (PAKE) protocols have actually been
widely used in our daily life to provide security assurance, by which two parties can achieve …

Secure cross-realm C2C-PAKE protocol

Y Yin, L Bao - Australasian Conference on Information Security and …, 2006 - Springer
Client-to-client password authenticated key exchange (C2C-PAKE) protocol deals with the
authenticated key exchange process between two clients, who only share their passwords …

TBVPAKE: An efficient and provably secure verifier-based PAKE protocol for IoT applications

M Qi, Z Cui, G Liang - Journal of Systems Architecture, 2023 - Elsevier
Password-authenticated key exchange (PAKE) is an important cryptographic primitive by
which two parties are allowed to authenticate each other and establish a cryptographically …

[PDF][PDF] The three-party password authenticated key exchange protocol with stronger security

XF Ding, CG MA - Journal of Computer, 2010 - Citeseer
Most password authenticated key exchange (PAKE) protocol designers ignored the attacks
resulting from leakage of long-term secret keys (passwords). In this paper, we find that it is …

Efficient and provably secure client-to-client password-based key exchange protocol

JW Byun, DH Lee, J Lim - Asia-Pacific Web Conference, 2006 - Springer
We study client-to-client password-authenticated key exchange (C2C-PAKE) enabling two
clients in different realms to agree on a common session key using different passwords …

One-round protocol for two-party verifier-based password-authenticated key exchange

JO Kwon, K Sakurai, DH Lee - … and Multimedia Security: 10th IFIP TC-6 TC …, 2006 - Springer
Password-authenticated key exchange (PAKE) for two-party allows a client and a server
communicating over a public network to share a session key using a human-memorable …

EC2C-PAKA: An efficient client-to-client password-authenticated key agreement

JW Byun, DH Lee, JI Lim - Information Sciences, 2007 - Elsevier
Most password-authenticated key agreement schemes described in the literature have
focused on authenticated key agreement using a shared password between a client and a …

Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols

RCW Phan, BM Goi - Progress in Cryptology-INDOCRYPT 2006: 7th …, 2006 - Springer
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow parties to share
secret keys in an authentic manner based on an easily memorizable password. Byun et al …

A verifier-based password-authenticated key exchange using tamper-proof hardware

JS Shin, M Jo, JY Hwang, J Lee - The Computer Journal, 2021 - academic.oup.com
Password-based authenticated key exchange (PAKE) allows two parties to compute a
common secret key. PAKE offers the advantage of allowing two parties to pre-share only a …

Efficient verifier-based password-authenticated key exchange in the three-party setting

JO Kwon, IR Jeong, K Sakurai, DH Lee - Computer Standards & Interfaces, 2007 - Elsevier
In the last few years, researchers have extensively studied the password-authenticated key
exchange (PAKE) in the three-party setting. The fundamental security goal of PAKE is …