RSA-Based Password-Authenticated Key Exchange, Revisited
نویسندگان
چکیده
منابع مشابه
More Efficient Password Authenticated Key Exchange Based on RSA
In [17], Zhu, et al. proposed a RSA-based password authenticated key exchange scheme which supports short RSA public exponents. The scheme is the most efficient one among all the RSA-based schemes currently proposed when implemented on low-power asymmetric wireless networks. We observe that its performance can further be improved by proposing two modifications. The first modification shortens t...
متن کاملNew Approaches to Password Authenticated Key Exchange Based on RSA
We investigate eÆcient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authenticated key exchange were based on DiÆe-Hellman key exchange. It seems diÆcult to design eÆcient password-authenticated key exchange protocols using RSA and other public-key cryptographic techniques. In fact, many of the p...
متن کاملPassword-Based Authenticated Key Exchange
Authenticated Key Exchange protocols enable several parties to establish a shared cryptographically strong key over an insecure network using various authentication means, such as strong cryptographic keys or short (i.e., low-entropy) common secrets. The latter example is definitely the most interesting in practice, since no additional device is required, but just a human-memorable password, fo...
متن کاملOne-Round Password-Based Authenticated Key Exchange
We show a general framework for constructing password-based authenticated key exchangeprotocols with optimal round complexity — one message per party, sent simultaneously — inthe standard model, assuming the existence of a common reference string. When our frameworkis instantiated using bilinear-map cryptosystems, the resulting protocol is also (reasonably)efficient. Somewhat su...
متن کاملPartitioned Group Password-Based Authenticated Key Exchange
Group Password-Based Authenticated Key Exchange (GPAKE) allows a group of users to establish a secret key, as long as all of them share the same password. However, in existing GPAKE protocols as soon as one user runs the protocol with a non-matching password, all the others abort and no key is established. In this paper we seek for a more flexible, yet secure, GPAKE and put forward the notion o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2008
ISSN: 0916-8532,1745-1361
DOI: 10.1093/ietisy/e91-d.5.1424