VSPAKE: Provably secure verifier-based PAKE protocol for client/server model in TLS ciphersuite
M Qi - Journal of Systems Architecture, 2024 - Elsevier
Nowadays, password-authenticated key exchange (PAKE) protocols have actually been
widely used in our daily life to provide security assurance, by which two parties can achieve …
widely used in our daily life to provide security assurance, by which two parties can achieve …
Secure cross-realm C2C-PAKE protocol
Y Yin, L Bao - Australasian Conference on Information Security and …, 2006 - Springer
Client-to-client password authenticated key exchange (C2C-PAKE) protocol deals with the
authenticated key exchange process between two clients, who only share their passwords …
authenticated key exchange process between two clients, who only share their passwords …
TBVPAKE: An efficient and provably secure verifier-based PAKE protocol for IoT applications
M Qi, Z Cui, G Liang - Journal of Systems Architecture, 2023 - Elsevier
Password-authenticated key exchange (PAKE) is an important cryptographic primitive by
which two parties are allowed to authenticate each other and establish a cryptographically …
which two parties are allowed to authenticate each other and establish a cryptographically …
[PDF][PDF] The three-party password authenticated key exchange protocol with stronger security
XF Ding, CG MA - Journal of Computer, 2010 - Citeseer
Most password authenticated key exchange (PAKE) protocol designers ignored the attacks
resulting from leakage of long-term secret keys (passwords). In this paper, we find that it is …
resulting from leakage of long-term secret keys (passwords). In this paper, we find that it is …
Efficient and provably secure client-to-client password-based key exchange protocol
We study client-to-client password-authenticated key exchange (C2C-PAKE) enabling two
clients in different realms to agree on a common session key using different passwords …
clients in different realms to agree on a common session key using different passwords …
One-round protocol for two-party verifier-based password-authenticated key exchange
JO Kwon, K Sakurai, DH Lee - … and Multimedia Security: 10th IFIP TC-6 TC …, 2006 - Springer
Password-authenticated key exchange (PAKE) for two-party allows a client and a server
communicating over a public network to share a session key using a human-memorable …
communicating over a public network to share a session key using a human-memorable …
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
Most password-authenticated key agreement schemes described in the literature have
focused on authenticated key agreement using a shared password between a client and a …
focused on authenticated key agreement using a shared password between a client and a …
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow parties to share
secret keys in an authentic manner based on an easily memorizable password. Byun et al …
secret keys in an authentic manner based on an easily memorizable password. Byun et al …
A verifier-based password-authenticated key exchange using tamper-proof hardware
JS Shin, M Jo, JY Hwang, J Lee - The Computer Journal, 2021 - academic.oup.com
Password-based authenticated key exchange (PAKE) allows two parties to compute a
common secret key. PAKE offers the advantage of allowing two parties to pre-share only a …
common secret key. PAKE offers the advantage of allowing two parties to pre-share only a …
Efficient verifier-based password-authenticated key exchange in the three-party setting
In the last few years, researchers have extensively studied the password-authenticated key
exchange (PAKE) in the three-party setting. The fundamental security goal of PAKE is …
exchange (PAKE) in the three-party setting. The fundamental security goal of PAKE is …