New techniques for SPHFs and efficient one-round PAKE protocols

F Benhamouda, O Blazy, C Chevalier… - Annual Cryptology …, 2013 - Springer
Password-authenticated key exchange (PAKE) protocols allow two players to agree on a
shared high entropy secret key, that depends on their own passwords only. Following the …

A new general framework for secure public key encryption with keyword search

R Chen, Y Mu, G Yang, F Guo, X Wang - … , QLD, Australia, June 29--July 1 …, 2015 - Springer
Abstract Public Key Encryption with Keyword Search (PEKS), introduced by Boneh et al. in
Eurocrypt'04, allows users to search encrypted documents on an untrusted server without …

Public‐key encryption indistinguishable under plaintext‐checkable attacks

M Abdalla, F Benhamouda… - IET Information …, 2016 - Wiley Online Library
Indistinguishability under chosen‐ciphertext attack (IND‐CCA) is now considered the de
facto security notion for public‐key encryption. However, this sometimes offers a stronger …

Verifier-based password-authenticated key exchange: New models and constructions

F Benhamouda, D Pointcheval - Cryptology ePrint Archive, 2013 - eprint.iacr.org
While password-authenticated key exchange (or PAKE) protocols have been deeply
studied, a server corruption remains the main threat, with many concrete cases nowadays …

Zero-knowledge password policy checks and verifier-based PAKE

F Kiefer, M Manulis - Computer Security-ESORICS 2014: 19th European …, 2014 - Springer
Abstract Zero-Knowledge Password Policy Checks (ZKPPC), introduced in this work, enable
blind registration of client passwords at remote servers, ie, client passwords are never …

Distributed smooth projective hashing and its application to two-server password authenticated key exchange

F Kiefer, M Manulis - Applied Cryptography and Network Security: 12th …, 2014 - Springer
Smooth projective hash functions have been used as building block for various
cryptographic applications, in particular for password-based authentication. In this work we …

A verifier-based password-authenticated key exchange using tamper-proof hardware

JS Shin, M Jo, JY Hwang, J Lee - The Computer Journal, 2021 - academic.oup.com
Password-based authenticated key exchange (PAKE) allows two parties to compute a
common secret key. PAKE offers the advantage of allowing two parties to pre-share only a …

Trapdoor smooth projective hash functions

F Benhamouda, D Pointcheval - Cryptology ePrint Archive, 2013 - eprint.iacr.org
Katz and Vaikuntanathan recently improved smooth projective hash functions in order to
build one-round password-authenticated key exchange protocols (PAKE). To achieve …

[图书][B] Advancements in password-based cryptography

F Kiefer - 2016 - search.proquest.com
Password-based authentication is the most popular authentication mechanism for humans
today, not only on the internet. Despite increasing efforts to move to supposedly more secure …

Removing erasures with explainable hash proof systems

M Abdalla, F Benhamouda, D Pointcheval - Cryptology ePrint Archive, 2014 - eprint.iacr.org
An important problem in secure multi-party computation is the design of protocols that can
tolerate adversaries that are capable of corrupting parties dynamically and learning their …