Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
スポンサーリンク
概要
- 論文の詳細を見る
Multi-party password-authenticated key exchange (PAKE) with different passwords allows the users of a group to agree on a common session key with their different passwords by the help of a server. In this setting, a user shares a password only with the server, but not between the users. In this paper, we present two multi-party PAKE protocols. The suggested protocols are provably-secure in the standard model. Our first protocol is designed to provide forward secrecy and security against known-key attacks. The second protocol is designed to additionally provide key secrecy against the server which means that even the server can not know the session keys of the users of a group. The suggested protocols require a constant number of rounds.
- 一般社団法人情報処理学会の論文
- 2006-07-20
著者
-
SAKURAI Kouichi
Department of Computer Science and Communication Engineering, Kyushu University
-
Lee Dong
Graduate School of Information Management & Security, CIST, Korea University
-
Lee Dong
Graduate School Of Information Security Cist Korea University
-
Sakurai Kouichi
Department Of Computer Science And Communication Engineering Kyushu University
-
KWON Jeong
Graduate School of Information Security CIST, Korea university
-
Kwon Jeong
Graduate School Of Information Security Cist Korea University
-
Sakurai Kouichi
Department Of Computer Science And Communication Engineering Faculty Of Information Science And Elec
-
Lee Dong
Graduate School Of Information & Communication Ajou University
-
Sakurai Kouichi
Department Of Applied Science Faculty Of Engineering 36 Kyushu University
関連論文
- Reliable Key Distribution Scheme for Lossy Channels
- RFID tag search protocol preserving privacy of mobile reader holders
- On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme
- A reliability analysis based scheduling algorithm in heterogeneous system
- A Flexible User-centric Resource Scheduling Algorithm
- Analysis and Comparison of Crytographic Techniques in E-voting and E-auction
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- Reliable Key Distribution Scheme for Lossy Channels
- D-031 Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
- Private Data Clustering based on Secure Approximation
- Stronger Chikazawa-Yamagishi ID-Based Key Distribution
- Searchable Encryption with Keyword-Recoverability
- SSR (Smart Sleep Recognizer): Making Decision Based on Probability of User's Intension (日韓合同ワークショップ 1st Korea-Japan Joint Workshop on Ubiquitous Computing and Networking Systems (ubiCNS 2005))
- Change of Rotated Cube Texture through Multi-processing in 3% Si-steels
- Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
- Analysis of Revocable-iff-Linked Ring Signature Scheme
- Strong ID-Based Key Distribution
- Three-Round Smart Card-Based Key Exchange Scheme(Fundamental Theories for Communications)
- On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing(Information Security)
- Analysis and Design for Private Message Board Systems
- On the Complexity of the Discrete Logarithm for a General Finite Group (Special Section on Cryptography and Information Security)
- Improved Subset Difference Method with Ternary Tree
- Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol
- Ultimate Longitudinal Strength-Based Safety and Reliability Assessment of a Ship′s Hull Girder〔付 討論〕
- Incompletely Condensed Silsesquioxanes : Formation and Reactivity
- On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks(Tamper-Resistance)(Cryptography and Information Security)
- Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost(Application)(Cryptography and Information Security)
- Analysis and Design for Private Message Board Systems (Applications) (Cryptography and Information Security)
- Special Section on Discrete Mathematics and Its Applications
- A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations
- Securing Provenance of Distributed Processes in an Untrusted Environment
- Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data
- Equivalence problem and automorphisms of some abelian branched coverings of the Riemann sphere
- Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages