• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Authenticated Key Exchange Secure Against Dictionary Attacks (2000)

Cached

  • Download as a PDF

Download Links

  • [seclab.cs.ucdavis.edu]
  • [www.cs.ucsd.edu]
  • [www.cs.ucsd.edu]
  • [eprint.iacr.org]
  • [www-cse.ucsd.edu]
  • [www-cse.ucsd.edu]
  • [www.cs.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [charlotte.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [www.cs.ucdavis.edu]
  • [www.cs.ucdavis.edu]
  • [web.cs.ucdavis.edu]
  • [eprint.iacr.org]
  • [www.scs.cs.nyu.edu]
  • [www.di.ens.fr]
  • [www.iacr.org]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Mihir Bellare , David Pointcheval , Phillip Rogaway
Citations:400 - 35 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Bellare00authenticatedkey,
    author = {Mihir Bellare and David Pointcheval and Phillip Rogaway},
    title = {Authenticated Key Exchange Secure Against Dictionary Attacks},
    booktitle = {},
    year = {2000},
    pages = {139--155},
    publisher = {Springer-Verlag}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, off line, all possible passwords. While several such protocols have been suggested, the underlying theory has been lagging. We begin by defining a model for this problem, one rich enough to deal with password guessing, forward secrecy, server compromise, and loss of session keys. The one model can be used to define various goals. We take AKE (with "implicit" authentication) as the "basic" goal, and we give definitions for it, and for entity-authentication goals as well. Then we prove correctness for the idea at the center of the Encrypted Key-Exchange (EKE) protocol of Bellovin and Merritt: we prove security, in an ideal-cipher model, of the two-flow protocol at the core of EKE.

Keyphrases

various goal    key exchange    basic goal    two-flow protocol    password guessing    encrypted key-exchange    ideal-cipher model    password-based protocol    possible password    entity-authentication goal    several protocol    implicit authentication    session key   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University