Authenticated Diffe-Hellman key agreement protocols

S Blake-Wilson, A Menezes - International Workshop on Selected Areas in …, 1998 - Springer
This paper surveys recent work on the design and analysis of key agreement protocols that
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …

Block design-based key agreement for group data sharing in cloud computing

J Shen, T Zhou, D He, Y Zhang, X Sun… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Data sharing in cloud computing enables multiple participants to freely share the group data,
which improves the efficiency of work in cooperative environments and has widespread …

Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

Analysis of key-exchange protocols and their use for building secure channels

R Canetti, H Krawczyk - International conference on the theory and …, 2001 - Springer
We present a formalism for the analysis of key-exchange protocols that combines previous
definitional approaches and results in a definition of security that enjoys some important …

Universally composable notions of key exchange and secure channels

R Canetti, H Krawczyk - … 2002: International Conference on the Theory and …, 2002 - Springer
Abstract Recently, Canetti and Krawczyk (Eurocrypt'2001) formulated a notion of security for
key-exchange (ke) protocols, called SK-security, and showed that this notion suffices for …

[图书][B] Modern cryptography: theory and practice

W Mao - 2003 - books.google.com
Our society has entered an era where commerce activities, business transactions and
government services have been, and more and more of them will be, conducted and offered …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Stronger security of authenticated key exchange

B LaMacchia, K Lauter, A Mityagin - International conference on provable …, 2007 - Springer
Recent work by Krawczyk [12] and Menezes [16] has highlighted the importance of
understanding well the guarantees and limitations of formal security models when using …

HMQV: A high-performance secure Diffie-Hellman protocol

H Krawczyk - Annual international cryptology conference, 2005 - Springer
The MQV protocol of Law, Menezes, Qu, Solinas and Vanstone is possibly the most efficient
of all known authenticated Diffie-Hellman protocols that use public-key authentication. In …

Provably secure password-authenticated key exchange using Diffie-Hellman

V Boyko, P MacKenzie, S Patel - … on the Theory and Application of …, 2000 - Springer
When designing password-authenticated key exchange protocols (as opposed to key
exchange protocols authenticated using crypto-graphically secure keys), one must not allow …