Authenticated Diffe-Hellman key agreement protocols
S Blake-Wilson, A Menezes - International Workshop on Selected Areas in …, 1998 - Springer
This paper surveys recent work on the design and analysis of key agreement protocols that
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …
Block design-based key agreement for group data sharing in cloud computing
Data sharing in cloud computing enables multiple participants to freely share the group data,
which improves the efficiency of work in cooperative environments and has widespread …
which improves the efficiency of work in cooperative environments and has widespread …
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …
anonymous two-factor authentication scheme, for the designers are confronted with an …
Analysis of key-exchange protocols and their use for building secure channels
R Canetti, H Krawczyk - International conference on the theory and …, 2001 - Springer
We present a formalism for the analysis of key-exchange protocols that combines previous
definitional approaches and results in a definition of security that enjoys some important …
definitional approaches and results in a definition of security that enjoys some important …
Universally composable notions of key exchange and secure channels
R Canetti, H Krawczyk - … 2002: International Conference on the Theory and …, 2002 - Springer
Abstract Recently, Canetti and Krawczyk (Eurocrypt'2001) formulated a notion of security for
key-exchange (ke) protocols, called SK-security, and showed that this notion suffices for …
key-exchange (ke) protocols, called SK-security, and showed that this notion suffices for …
[图书][B] Modern cryptography: theory and practice
W Mao - 2003 - books.google.com
Our society has entered an era where commerce activities, business transactions and
government services have been, and more and more of them will be, conducted and offered …
government services have been, and more and more of them will be, conducted and offered …
[图书][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
Stronger security of authenticated key exchange
B LaMacchia, K Lauter, A Mityagin - International conference on provable …, 2007 - Springer
Recent work by Krawczyk [12] and Menezes [16] has highlighted the importance of
understanding well the guarantees and limitations of formal security models when using …
understanding well the guarantees and limitations of formal security models when using …
HMQV: A high-performance secure Diffie-Hellman protocol
H Krawczyk - Annual international cryptology conference, 2005 - Springer
The MQV protocol of Law, Menezes, Qu, Solinas and Vanstone is possibly the most efficient
of all known authenticated Diffie-Hellman protocols that use public-key authentication. In …
of all known authenticated Diffie-Hellman protocols that use public-key authentication. In …
Provably secure password-authenticated key exchange using Diffie-Hellman
V Boyko, P MacKenzie, S Patel - … on the Theory and Application of …, 2000 - Springer
When designing password-authenticated key exchange protocols (as opposed to key
exchange protocols authenticated using crypto-graphically secure keys), one must not allow …
exchange protocols authenticated using crypto-graphically secure keys), one must not allow …