The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Leveraging category-level labels for instance-level image retrieval

A Gordoa, JA Rodriguez-Serrano… - … IEEE Conference on …, 2012 - ieeexplore.ieee.org
In this article, we focus on the problem of large-scale instance-level image retrieval. For
efficiency reasons, it is common to represent an image by a fixed-length descriptor which is …

Provably secure three-party password-based authenticated key exchange protocol

J Zhao, D Gu - Information Sciences, 2012 - Elsevier
A three-party password-based authenticated key exchange (3PAKE) protocol is a useful
mechanism to establish a secure session key in a network. However, most current 3PAKE …

A Critical appraisal on Password based Authentication

AA Kaur, KK Mustafa - International Journal of Computer Network …, 2019 - mecs-press.org
There is no doubt that, even after the development of many other authentication schemes,
passwords remain one of the most popular means of authentication. A review in the field of …

Stronger security model of group key agreement

J Zhao, D Gu, MC Gorantla - Proceedings of the 6th ACM Symposium on …, 2011 - dl.acm.org
In PKC 2009, Gorantla, Boyd and González Nieto presented a nice result on modelling
security for group key agreement (GKA) protocols. They proposed a novel security model …

Password‐Only Authenticated Three‐Party Key Exchange with Provable Security in the Standard Model

J Nam, KKR Choo, J Kim, HK Kang… - The Scientific World …, 2014 - Wiley Online Library
Protocols for password‐only authenticated key exchange (PAKE) in the three‐party setting
allow two clients registered with the same authentication server to derive a common secret …

Two-round password-only authenticated key exchange in the three-party setting

J Nam, KKR Choo, S Han, J Paik, D Won - Symmetry, 2015 - mdpi.com
We present the first provably-secure three-party password-only authenticated key exchange
(PAKE) protocol that can run in only two communication rounds. Our protocol is generic in …

[PDF][PDF] 基于智能卡的强安全认证与密钥协商协议

李晓伟, 张玉清, 张格非, 刘雪峰, 范丹 - 电子学报, 2014 - ejournal.org.cn
将认证与密钥协商(Authenticated Key Agreement, AKA) 协议所需的一种强安全属性——
抗临时密钥泄露攻击引入到基于智能卡和口令的AKA 协议中, 基于NAXOS 方法分别提出了基于 …

Cross-realm password-based server aided key exchange

K Yoneyama - … Applications: 11th International Workshop, WISA 2010 …, 2011 - Springer
In this paper, we extend password-based server aided key exchange (PSAKE) to the cross-
realm setting which two clients in two different realms with different passwords can …