2006
DOI: 10.1007/11610113_81
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
25
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(25 citation statements)
references
References 16 publications
0
25
0
Order By: Relevance
“…A further variant of the latter attack even causes a party to think it is sharing a key with a party different from the party it is supposed to share with: unknown key-share attack [17,20]. The existence of malicious servers acting as active adversaries is indeed considered by the security proof of EC2C-PAKE [12] but still it was not able to catch our attacks. Fortunately, the C2C-PAKE-YB model captures these later attacks because it disregards as impossible to obtain key privacy when active server adversaries exist.…”
Section: Introductionmentioning
confidence: 81%
See 3 more Smart Citations
“…A further variant of the latter attack even causes a party to think it is sharing a key with a party different from the party it is supposed to share with: unknown key-share attack [17,20]. The existence of malicious servers acting as active adversaries is indeed considered by the security proof of EC2C-PAKE [12] but still it was not able to catch our attacks. Fortunately, the C2C-PAKE-YB model captures these later attacks because it disregards as impossible to obtain key privacy when active server adversaries exist.…”
Section: Introductionmentioning
confidence: 81%
“…We now describe each of provably secure protocols [12,28] in turn. We will use the notations given in Table 1.…”
Section: Two Provably Secure C2c-pake Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, S. Wang et al subsequently found the protocol due to Byun et al was insecure [22]. Later, two schemes for password-authenticated key establishment in a cross-realm setting were proposed in [24,25] but both of them were still pointed out to be insecure in [26]. To the best of our knowledge, no more work address the problem in the cross-realm setting and achieves provable security.…”
Section: Introductionmentioning
confidence: 99%