- Bea.D. BEAVER, "Foundations of Secure Interactive Computing'', CRYPTO '91. Google ScholarDigital Library
- BCK.1%I. BELLARE, R. CANETTI AND H. KaAWCZYK, "A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols", Available at http://w,r~-cse.uc~d.edu/users/mihir and at the Theow of Cryptography Libra.,5; http://theory.lcs.mit.edu/'tcryptol, March 1998.Google Scholar
- BPRR.1%I. BELLARE, E. PETIL~NK, C. RACKOFF AND P. ROG- AV,'AY, "Authenticated key exchange in the public key model," 1995-96.Google Scholar
- BR1.1%I. BELLArm ANn P. ROOAWAY, "Entity authentication and key distribution", CRYPTO '93. Google ScholarDigital Library
- BR2.M. BELLARE AND P. ROGAWAY, "Provably secure session key distribution- the three party case," Prec. of the 27th ACM STOC, ACM, 1995. Google ScholarDigital Library
- BlMe.S. BLXKE-WmSON AND A. MENEZES, "Entity authentication and authenticated key transport protocols employing asymmetric techniques", Proceedings of the 1997 Security Protocols ~Ibrkshop, 1997. Google ScholarDigital Library
- BJM.S. BLAKE-WILSON, D. JOHNSON AND A. MENEZES, "Key exchange protocols and their security analysis," Proceedings of the sixth IMA International Conference on Cryptography and Coding, 1997. Google ScholarDigital Library
- BCG.M. BEN-OR, R. CANETTI AND O. GOLDREICH, "Asynchronous Secure Computations", Prec. of the 25th ACM STOC, ACM, 1993. Google ScholarDigital Library
- BGW.M. BEN-OR, S. GOLD%VXSSER, AND A. WIODEaSON, Completeness theorems for non-cryptographic faulttolerant distributed computations, Prec. of the 20th ACM STOC, ACM, 1988. Google ScholarDigital Library
- BGH+.R. Bin. D, I. Goem., A. H~.RZnERO, P. JANSEN, S. KUT- TEN, R. MOLVA Arid M. YVNC, "Systematic design of two-party authentication protocols," CRYPTO '91.Google Scholar
- BAN.1%I. Bv~mows, 1%1. ABADI AND R. N~.EDHAM, "A logic for authentication," DEC Systems Research Center Technical Report 39, February 1990. Earlier versions in Proceedings of the Second Conference on Theoreticzl Aspects of Reasoning about Knowledge, 1988, and Proceedings of the Twelfth ACM Symposium on Operating Systems Principles, 1989.Google Scholar
- Ca1.R. CANr. T'n, "Modular Composition of Secure Multiparty Protocols", Ax~ilable at the Theory of Cryptography Librars; http://theory.lcs.mi~.edu/ tcryptol, 1998.Google Scholar
- Ca2.R. CANETTI, "Towards realizing random oracles: Hash functions that hide all partial information", CR~fPTO '97. Google ScholarDigital Library
- CFGN.R. CANETTI, U. FEIOE, O. GOLDnEWH AND 1%~. NAOn, "Adaptively Secure Computation", Prec. of the 28th ACM STOC, ACM, 1996. Fuller version MIT-LCS-TR #682, 1996. Google ScholarDigital Library
- CCD.D. CHAUM, C. CRI~PEAU, AND I. DAMGARD, "Multiparty unconditionally secure protocols", Prec. of the 20th ACM STOC, ACM, 1988. Google ScholarDigital Library
- DH.W. Dmrm AND M. HELLMAN, "New directions in cryptography,'' iEEE Trans. Into. Theo,y iT-22, November 1976, pp. 644-654.Google Scholar
- DOW.W. DIFFm, P. VAN OORSCHOT AND M. WmN~a, "Authentication and authenticated key exchange?, Designs, Codes and Cryptography, 2, 1992, pp. 107-125. Google ScholarDigital Library
- DDN.D. DOLP. V, C. DWORK AND M. NAon, "Non-malleable cryptography", TR CS95-27, Weizmann Institute. Preliminary version in Prec. of the 23rd ACM STOC, ACM, 1991.Google Scholar
- GMW.O. GOLDP~ICH, $. MICALI AND A. WmDEnSOr~, "How to play any mental game, or A completeness theorem for protocols with honest majority," Prec. o~ the 19th ACM STOC, ACM, 1987. Google ScholarDigital Library
- GMR.S. COLDWASSEIt, $. h'IIOALI AND R. RIVEST, "A digital signature scheme secure against adaptive chosenmessage attacks," SIAM Journal of Computing, Vol. 17, No. 2, April 1988, pp. 281-308. Google ScholarDigital Library
- ISO.ISO/IEC IS 9798-3, "Entity authentication mcchanism~ --- Part 3: Entity authentication using asymmetric techniques'', 1993.Google Scholar
- HC.D. HARKINS AND D. CArmEL, ed., "The resolution of ISAKMP with Oakle)%" lnternet draft, draft-ietf-ipsec-isakmp-oakley-05.txt, Nov. 1997.Google Scholar
- Kra.H. KRAWOZYK, "SKEME: A Versatile Secure Key Exchange Mechanism for Internet,", Proceedings of the 1996 Internet Society Symposium on Network and Distributed System Securit~ Feb. 1996, pp. 114-127. Google ScholarDigital Library
- Luc.S. LUCKS, "Open key exchange: How to defeat dictionary attacks without encrypting public keys," Proceedings of the 1997 Security Protocols tVorl.'shop, 1997. Google ScholarDigital Library
- MVV.A. MENEZES, P. VAN OORSCHOT AND S. VANSTONE, "Handbook of Applied Cryptography," CRC PresJ, 1996. Google ScholarDigital Library
- MR.S. MIOALI AND P. ROGAWAY, "Secure Computation", Manuscript, 1992. Preliminary version in CRYPTO '91.Google Scholar
- NR.M. Nxoa AND O. R~IN(~OLD, "Efficient cryptographlc primitives based on the decisional Diffie-He!lman assumption'', Prec. of the 38th IEEE FOCS, IEEE, 1997.Google Scholar
- NY.M. NAOR AND M. YUNO, "Public key cryptosystem~ provably secure against chosen ciphertext attacks", Prec. of the 22nd ACM STOC, ACM, 1990. Google ScholarDigital Library
- NS.R. NEEDHAM AND M. SOHROEDER, "Using encryption for authentication in large networks of computers," Communications of the ACM, Vol. 21, No. 12, December 1978, pp. 993-999. Google ScholarDigital Library
- Ra.C. RAOKOFF, "Some definitions, protocols and proofo about secure authentication," IBM CASCON 92. Google ScholarDigital Library
- SR.V. SHOUP AND A. RUmN. Session key distribution using smart cards. EUROCRYPT '96. Google ScholarDigital Library
- RS.C. RACKOFr AND D. SIMON, "Non-interactive zeroknowledge proof of knmvledge and chosen ciphertext attack", CRYPTO '91. Google ScholarDigital Library
- SNS.J. STErnER, C. NEWMAN AND J. SCmLr. Ert, "Kerbero:t: an authentication service for open network systems," Proceedings of the USENIX Winter Conferenco, 1988, pp. 191-202.Google Scholar
- Y.A. YAO, Protocols for Secure Computation, In Prec, 23th Annual Syrup. on Foundations of Computer Sci. once, pages 160-164. IEEE, 1982.Google Scholar
Index Terms
- A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract)
Recommendations
ID2S Password-Authenticated Key Exchange Protocols
In a two-server password-authenticated key exchange (PAKE) protocol, a client splits its password and stores two shares of its password in the two servers, respectively, and the two servers then cooperate to authenticate the client without knowing the ...
Universally composable symbolic analysis of mutual authentication and key-exchange protocols
TCC'06: Proceedings of the Third conference on Theory of CryptographySymbolic analysis of cryptographic protocols is dramatically simpler than full-fledged cryptographic analysis. In particular, it is simple enough to be automated. However, symbolic analysis does not, by itself, provide any cryptographic soundness ...
Scalable Protocols for Authenticated Group Key Exchange
We consider the problem of authenticated group key exchange among n parties communicating over an insecure public network. A number of solutions to this problem have been proposed; however, all prior provably secure solutions do not scale well and, in ...
Comments