- 1.A. BEIMEL AND B. CHOR, "Interaction in key distrib-ution schemes," Crypto 93. Google ScholarDigital Library
- 2.M. BELLARE AND P. ROGAWAY, "Entity authentica-tion and key distribution," Crypto 93. Google ScholarDigital Library
- 3.R. BIRD, I. GOPAL, A. HERZBERG, P. JAIW+ON, S. KUTTEN, R. MOLVA AND M. YUNG, "Systematic de-sign oft we-part y aut bent ication protocols," Crypt 091.Google Scholar
- 4.R. BIRD, 1. GOPAL, A. HERZBERG, P. JANSON, S. KUTTEN, R, MOLVA AND M. YUNG, "The Kryp-toKnight family of light-weight protocols for authenti-cation and key distribution," IEEE/ACM T. on Net-working, 3(1), February 1995. Google ScholarDigital Library
- 5.R BLOM, "An optimal class of symmetric key genera-tion systems," Eurocrypt 84. Google ScholarDigital Library
- 6.C BLWNDO, A. DE SANTIS, A. HERZBERG, S. KUT-TEN AND M. YUNG, "Perfectly-secure key distribution for dynamic conferences," Crypto 92. Google ScholarDigital Library
- 7.M. BURROWS, M. ABADI AND R. NEEDHAM, "A logic for authentication," ACM Transactions on computer systems, Vol. 8, No. 1. Google ScholarDigital Library
- 8.D. DENNING AND G. SACCO, "Timestamps in key distribution protocols," Communications of the ACM, Vol. 24, No. 8, pp. 533-536, 1981. Google ScholarDigital Library
- 9.W. DIFFIE AND M. E. HELLMANI "New directions in cryptography," IEEE Bans. Info. Theory IT-22, 644- 654 (November 1976).Google Scholar
- 10.W. DIFFIE, P. VAN 00RSCHOT AND M. WIENER, "Au-thentication and authenticated key exchanges," De-signs, ~odes and Cryptography, 2, 107-125 (1992). Google ScholarDigital Library
- 11.O. GOLDREICH, S. GOLDWASSER AND S. MICALI, "How to construct random functions," Journal of the ACM, vol. 33, No. 4, 210-217, (1986). Google ScholarDigital Library
- 12.S. GOLDWASSER AND S. MICALI, "Probabilistic en-cryption," Journal of Computer and System Sciences Vol. 28, 270-299 (April 1984).Google ScholarCross Ref
- 13.S. GOLDWiMSER, S. MICALI AND R. RIVEST, '{A digi-tal signature scheme secure against adaptive chosen-message at tacks," SIAM Jourrss.1 of Computing, Vol. 17, No. 2, 281-308, April 1988. Google ScholarDigital Library
- 14.J. HkTAD, R. IMPAGLIAZZO, L. LEVIN, AND M. LUBY, "Construction of a pseudo-random gener-ator from any one-way function." Manuscript. Earlier versions in STOC 89, STOC 90.Google Scholar
- 15.R. IMPA~LIAZZO AND M. LUBY, "One-way func-tions are essential for complexity based cryptography," FOCS 89. Google ScholarDigital Library
- 16.T. LEIGHTON AND S. MICALI, "Secret-key agreement without public-key cryptography," Crypto 93. Google ScholarDigital Library
- 17.R. NEEDHAM AND M. SCHROEDER, "Using encryp-tion for authentication in large networks of comput-ers," Communications of the ACM, Vol. 21, No. 12, 993-999, December 1978. Google ScholarDigital Library
- 18.R. NEEDHAM AND M. SCHROEDER, "Authentication revisited," Operating Systems Review, Vol. 21, No. 1, p. 7, January 1987. Google ScholarDigital Library
- 19.A. SHAMIR, "Identity-based cryptosystems and signa-ture schemes," Crypto 91. Google ScholarDigital Library
- 20.J. STEINER, C. NEWMAN AND J. SCHILLER, "Ker-beros: an authentication service for open network sys-t ems," Proceedings of the USEiVIX Winter Conference, pp. 191-202, 1988Google Scholar
- 21.Y. YACOBI AND Z, SHMUELY. "On key distribution sys-tems." Crypto 89. Google ScholarDigital Library
Index Terms
- Provably secure session key distribution: the three party case
Recommendations
On session key construction in provably-secure key establishment protocols
Mycrypt'05: Proceedings of the 1st international conference on Progress in Cryptology in MalaysiaWe examine the role of session key construction in provably-secure key establishment protocols. We revisit an ID-based key establishment protocol due to Chen & Kudla (2003) and an ID-based protocol 2P-IDAKA due to McCullagh & Barreto (2005). Both ...
Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols
This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with implicit user authentication and the ...
Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
INDOCRYPT'06: Proceedings of the 7th international conference on Cryptology in IndiaThree-party password-based authenticated key exchange (3-party PAKE) protocols make two communication parties establish a shared session key with the help of a trusted server, with which each of the two parties shares a predetermined password. Recently, ...
Comments