Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 15
Page No. 6211 - 6219

Insecure Instantiations of Random Oracles in Password-Based Key Exchange Protocols

Authors : JuryonPaik

References

Abdalla, M. and D. Pointcheval, 2005. Simple password-based encrypted key exchange protocols. Proceedings of the 2005 RSA Conference on Cryptographers’ Track, February 14-18, 2005, Springer, San Francisco, California, USA., ISBN:978-3-540-24399-1, pp: 191-208.

Abdalla, M. and D. Pointcheval, 2015. Interactive diffie-hellman assumptions with applications to password-based authentication. Proceedings of the 9th International Conference on Financial Cryptography and Data Security, February 28-March 3, 2005, Springer, Roseau, Dominica, ISBN:978-3-540-26656-3, pp: 341-356.

Bellare, M. and P. Rogaway, 1993. Random oracles are practical: A paradigm for designing efficient protocols. Proceedings of the 1st ACM Conference on Computer and Communications Security, November 3-5, 1993, ACM, Fairfax, Virginia, USA., ISBN:0-89791-629-8, pp: 62-73.

Bellare, M., D. Pointcheval and P. Rogaway, 2000. Authenticated key exchange secure against dictionary attacks. Proceedings of the 2000 International Conference on the Theory and Applications of Cryptographic Techniques, May 14-18, 2000, Springer, Belgium, ISBN:978-3-540-67517-4, pp: 139-.

Bellovin, S.M. and M. Merritt, 1992. Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, May 4-6, 1992, IEEE, Oakland, California, pp: 72-84.

Bresson, E., O. Chevassut and D. Pointcheval, 2004. New security results on encrypted key exchange. Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, March 1-4, 2004, Springer, Singapore, ISBN:978-3-540-21018-4, pp: 145-158.

Canetti, R., D. Dachman-Soled, V. Vaikuntanathan and H. Wee, 2012. Efficient password authenticated key exchange via oblivious transfer. Proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, May 21-23, 2012, Springer, Darmstadt, Germany, ISBN:978-3-642-30056-1, pp: 449-466.

Choo, K.K.R., C. Boyd and Y. Hitchcock, 2005. Errors in computational complexity proofs for protocols. Proceedings of the 11th International Conference on Theory and Application of Cryptology and Information Security, December 4-8, 2005, Springer, Chennai, India, ISBN:978-3-540-30684-9, pp: 624-643.

Goyal, V., A. Jain and R. Ostrovsky, 2010. Password-authenticated session-key generation on the internet in the plain model. Proceedings of the 30th Annual Conference on Cryptology, August 15-19, 2010, Springer, Santa Barbara, California, USA., ISBN:978-3-642-14622-0, pp: 277-294.

Katz, J. and V. Vaikuntanathan, 2013. Round-optimal password-based authenticated key exchange. J. Cryptology, 26: 714-743.
Direct Link  |  

Katz, J., R. Ostrovsky and M. Yung, 2009. Efficient and secure authenticated key exchange using weak passwords. J. ACM., 57: 3:1-3:39.
CrossRef  |  Direct Link  |  

Nam, J., J. Paik, H.K. Kang, U.M. Kim and D. Won, 2009. An off-line dictionary attack on a simple three-party key exchange protocol. IEEE. Commun. Lett., 13: 205-207.
Direct Link  |  

Nam, J., K.K.R. Choo, M. Kim, J. Paik and D. Won, 2013. Dictionary attacks against password-based authenticated three-party key exchange protocols. KSII. Trans. Internet Inf. Syst., 7: 3244-3260.

Szydlo, M., 2006. A note on chosen-basis decisional diffie-hellman assumptions. Proceedings of the 10th International Conference Financial Cryptography and Data Security (FC’06), February 27-March 2, 2006, Springer, Anguilla, ISBN:978-3-540-46255-2, pp: 166-170.

Wang, W. and L. Hu, 2006. Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols. Proceedings of the 7th International Conference on Cryptology in India, December 11-13, 2006, Springer, Kolkata, India, ISBN:978-3-540-49767-7, pp: 118-132.

Xiong, H., Y. Chen, Z. Guan and Z. Chen, 2013. Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Inf. Sci., 235: 329-340.
Direct Link  |  

Yi, X., S. Ling and H. Wang, 2013. Efficient two-server password-only authenticated key exchange. IEEE Trans. Parallel Distrib. Syst., 24: 1773-1782.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved