搜索结果: 1-15 共查到“军队指挥学 J-PAKE”相关记录15条 . 查询时间(0.078 秒)
Password-Authenticated Key Exchange (PAKE) protocols allow two parties that share a password to establish a shared key in a way that is immune to oine attacks. Asymmetric PAKE (aPAKE) [21] adapts thi...
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks
Password authentication key exchange PAKE
2018/3/7
Password-Authenticated Key Exchange (PAKE) protocols allow two parties that only share a password to establish a shared key in a way that is immune to offline attacks. Asymmetric PAKE (aPAKE) strength...
Password-based authenticated key exchange (PAKE) enables two users with shared low-entropy passwords to establish cryptographically strong session keys over insecure networks. At Asiacrypt 2009, Katz ...
Universally Composable Two-Server PAKE
PAKE Universal Composability Smooth Projective Hashing
2016/5/30
Two-Server Password Authenticated Key Exchange (2PAKE) protocols apply secret sharing
techniques to achieve protection against server-compromise attacks. 2PAKE protocols eliminate
the need for passw...
Blind Password Registration for Verifier-based PAKE
blind password registration verifier-based PAKE
2016/5/9
We propose Blind Password Registration (BPR), a new class of cryptographic protocols that is instrumental for secure registration of client passwords at remote servers with additional protection again...
Two More Efficient Variants of the J-PAKE Protocol
Password-authenticated key exchange J-PAKE Efficiency
2016/4/15
Recently, the password-authenticated key exchange protocol J-PAKE of Hao and Ryan (Workshop on Security Protocols 2008) was formally proven secure in the algebraic adversary model by Abdalla et al.(IE...
Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE
UC-PAKE bilinear pairings SXDH
2016/3/4
We introduce a novel notion of smooth (-verifier) non- interactive
zero-knowledge proofs (NIZK) which parallel the familiar notion of
smooth projective hash functions (SPHF). We also show that the r...
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE
Password policies password registration authentication
2016/1/23
Zero-Knowledge Password Policy Checks (ZKPPC), introduced in this work, enable blind registration of client passwords at remote servers, i.e., client passwords are never transmitted to the servers. ...
Distributed Smooth Projective Hashing and its Application to Two-Server PAKE
Smooth Projective Hash Functions Two-Server PAKE
2016/1/9
Smooth projective hash functions have been used as building block for various cryptographic
applications, in particular for password-based authentication.
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
password authentication secret sharing
2016/1/7
In a Password-Protected Secret Sharing (PPSS) scheme with parameters (t, n) (formalized
by Bagherzandi et al. [2]), a user Alice stores secret information s among n servers so that she
can later rec...
Dual-System Simulation-Soundness with Applications to UC-PAKE and More
Dual-System Simulation-Soundness two-tier proof system
2016/1/6
We introduce a novel concept of dual-system simulation-sound non-interactive zero-knowledge
(NIZK) proofs. Dual-system NIZK proof system can be seen as a two-tier proof system. As opposed
to the usu...
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
Authenticated Key Exchange Blind Signatures Smooth Projective Hash Functions
2016/1/3
Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high entropy secret key, that depends on their own passwords only. Following the Gennaro and Lindell's appro...
In this paper, we propose an efficient identity-based password
authenticated key exchange (IBPAKE) protocol using identitybased
KEM/DEM. In IBPAKE, a client conducts authentication based
on a human...
Oblivious PAKE and Efficient Handling of Password Trials
cryptographic protocols / Password Based Authenticated Key Exchange
2013/4/18
An often neglected problem for potential practical adoption of Password-based Authenticated Key Exchange (PAKE) protocols on the Internet is the handling of failed password trials. Unlike the currentl...
A New Security Model for Cross-Realm C2C-PAKE Protocol
Password-authenticated key exchange cross realm client-to-client provably secure
2008/8/11
Cross realm client-to-client password authenticated key exchange (C2C-PAKE) schemes are designed to enable two clients in different realms to agree on a common session key using different passwords. I...