Abstract. Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high entropy secret key, that depends on their own passwords only. Following the Gennaro and Lindell’s approach, with a new kind of smooth-projective hash functions (SPHFs), Katz and Vaikuntanathan recently came up with the first concrete one-round PAKE protocols, where the two players just have to send simulta-neous flows to each other. The first one is secure in the Bellare-Pointcheval-Rogaway (BPR) model and the second one in the Canetti’s UC framework, but at the cost of simulation-sound non-interactive zero-knowledge (SS-NIZK) proofs (one for the BPR-secure protocol and two for the UC-secure one), which make the overall constructions n...
Abstract. An important problem in secure multi-party computation is the design of protocols that can...
Password-based authenticated key exchange (PAKE) allows two parties with a shared pass- word to agr...
Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments intr...
Abstract. Password-authenticated key exchange (PAKE) protocols allow two players to agree on a share...
Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high ent...
Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high ent...
International audiencePassword-authenticated key exchange (PAKE) protocols allow two players to agre...
Password-Authenticated Key Exchange (PAKE) has received deep attention in the last few years, with a...
Password-authenticated key exchange (PAKE) protocols allow users sharing a password to agree upon a ...
Volume & Issue: Volume 29 (2019) - Issue 4 (December 2019) - New Perspectives in Nonlinear and Intel...
Volume & Issue: Volume 29 (2019) - Issue 4 (December 2019) - New Perspectives in Nonlinear and Intel...
International audienceIn 2009, Abdalla et al. proposed a reasonably practical password-authenticated...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Abstract. In this paper, we propose a simple and efficient password-only authenticated key exchange ...
Abstract. In this paper, we propose a simple and efficient password-only authenticated key exchange ...
Abstract. An important problem in secure multi-party computation is the design of protocols that can...
Password-based authenticated key exchange (PAKE) allows two parties with a shared pass- word to agr...
Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments intr...
Abstract. Password-authenticated key exchange (PAKE) protocols allow two players to agree on a share...
Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high ent...
Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high ent...
International audiencePassword-authenticated key exchange (PAKE) protocols allow two players to agre...
Password-Authenticated Key Exchange (PAKE) has received deep attention in the last few years, with a...
Password-authenticated key exchange (PAKE) protocols allow users sharing a password to agree upon a ...
Volume & Issue: Volume 29 (2019) - Issue 4 (December 2019) - New Perspectives in Nonlinear and Intel...
Volume & Issue: Volume 29 (2019) - Issue 4 (December 2019) - New Perspectives in Nonlinear and Intel...
International audienceIn 2009, Abdalla et al. proposed a reasonably practical password-authenticated...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Abstract. In this paper, we propose a simple and efficient password-only authenticated key exchange ...
Abstract. In this paper, we propose a simple and efficient password-only authenticated key exchange ...
Abstract. An important problem in secure multi-party computation is the design of protocols that can...
Password-based authenticated key exchange (PAKE) allows two parties with a shared pass- word to agr...
Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments intr...