Abstract. Smooth projective hash functions have been used as building block for various cryptographic applications, in particular for password-based authentication. In this work we propose the extended concept of distributed smooth projective hash functions where the computation of the hash value is distributed across n parties and show how to instantiate the underlying approach for languages consisting of Cramer-Shoup ciphertexts. As an application of distributed smooth projective hashing we build a new framework for the design of two-server password authenticated key exchange protocols, which we believe can help to “explain ” the design of earlier two-server password authenticated key exchange protocols
Volume & Issue: Volume 29 (2019) - Issue 4 (December 2019) - New Perspectives in Nonlinear and Intel...
Password-Authenticated Key Exchange (PAKE) has received deep attention in the last few years, with a...
Two-Server Password Authenticated Key Exchange (2PAKE) protocols apply secret shar-ing techniques to...
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange ...
Password-authenticated key exchange (PAKE) protocols allow users sharing a password to agree upon a ...
Abstract In this paper we present a general framework for password-based authenticated key exchangep...
Abstract. Password-Authenticated Key Exchange allows users to generate a strong cryptographic key ba...
Smooth projective hashing was firstly introduced by Cramer and Shoup (EuroCrypt\u2702) as a tool to ...
Abstract. Smooth Projective Hash Functions (SPHFs), also known as Hash Proof Systems, were first int...
Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments intr...
Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high ent...
Abstract. Password-authenticated key exchange (PAKE) protocols allow two players to agree on a share...
Abstract. Wepresent new frameworks for constructing public-key encryption schemes satisfying key-dep...
International audienceSmooth projective hashing has proven to be an extremely useful primitive, in p...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Volume & Issue: Volume 29 (2019) - Issue 4 (December 2019) - New Perspectives in Nonlinear and Intel...
Password-Authenticated Key Exchange (PAKE) has received deep attention in the last few years, with a...
Two-Server Password Authenticated Key Exchange (2PAKE) protocols apply secret shar-ing techniques to...
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange ...
Password-authenticated key exchange (PAKE) protocols allow users sharing a password to agree upon a ...
Abstract In this paper we present a general framework for password-based authenticated key exchangep...
Abstract. Password-Authenticated Key Exchange allows users to generate a strong cryptographic key ba...
Smooth projective hashing was firstly introduced by Cramer and Shoup (EuroCrypt\u2702) as a tool to ...
Abstract. Smooth Projective Hash Functions (SPHFs), also known as Hash Proof Systems, were first int...
Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments intr...
Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high ent...
Abstract. Password-authenticated key exchange (PAKE) protocols allow two players to agree on a share...
Abstract. Wepresent new frameworks for constructing public-key encryption schemes satisfying key-dep...
International audienceSmooth projective hashing has proven to be an extremely useful primitive, in p...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Volume & Issue: Volume 29 (2019) - Issue 4 (December 2019) - New Perspectives in Nonlinear and Intel...
Password-Authenticated Key Exchange (PAKE) has received deep attention in the last few years, with a...
Two-Server Password Authenticated Key Exchange (2PAKE) protocols apply secret shar-ing techniques to...