[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Password-based authenticated key exchange

D Pointcheval - International Workshop on Public Key Cryptography, 2012 - Springer
Abstract Authenticated Key Exchange protocols enable several parties to establish a shared
cryptographically strong key over an insecure network using various authentication means …

Sustainable and round-optimized group authenticated key exchange in vehicle communication

Z Li, M Wang, V Sharma, P Gope - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Vehicle authentication is an essential component validating the vehicle's identity and
ensuring the integrity of transformed data for intelligent transport vehicles (ITS) in the …

Password-authenticated group key exchange: A cross-layer design

Y Zhang, Y Xiang, X Huang - ACM Transactions on Internet Technology …, 2016 - dl.acm.org
Two-party password-authenticated key exchange (2PAKE) protocols provide a natural
mechanism for secret key establishment in distributed applications, and they have been …

Contributory password-authenticated group key exchange with join capability

M Abdalla, C Chevalier, L Granboulan… - Cryptographers' Track at …, 2011 - Springer
Password-based authenticated group key exchange allows any group of users in
possession of a low-entropy secret key to establish a common session key even in the …

A Novel Contributory Cross-domain group password-based authenticated key exchange protocol with adaptive security

L Zhu, C Guo, Z Zhang, W Fu… - 2017 IEEE Second …, 2017 - ieeexplore.ieee.org
Adaptively secure group password-based authenticated key exchange (GPAKE) protocols
have been proposed intensively during the last decade. These protocols enable group …

Universally composable three‐party password‐authenticated key exchange with contributiveness

X Hu, Z Zhang, Q Zhang - International Journal of …, 2015 - Wiley Online Library
Three‐party password‐authenticated key exchange (3PAKE) allows two clients, each
sharing a password with a trusted server, to establish a session key with the help of the …

[HTML][HTML] A general compiler for password-authenticated group key exchange protocol in the standard model

F Wei, N Kumar, D He, SS Yeo - Discrete Applied Mathematics, 2018 - Elsevier
Password-authenticated group key exchange (PGKE) protocols are critical for ensuring
secure group communications for mobile devices. Until now, only few PGKE protocols have …

A new family of implicitly authenticated diffie-hellman protocols

AC Yao, Y Zhao - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Cryptography algorithm standards play a key role both to the practice of information security
and to cryptography theory research. Among them, the MQV and HMQV protocols ((H) MQV …

[图书][B] Advancements in password-based cryptography

F Kiefer - 2016 - search.proquest.com
Password-based authentication is the most popular authentication mechanism for humans
today, not only on the internet. Despite increasing efforts to move to supposedly more secure …