AbstractPassword-based group key agreement protocols are fundamental component of the communications systems. In 2009, Zheng et al. proposed an efficient and provably secure password-based agreement protocol and declared their protocol is secure in the ideal-cipher and random oracle models under the DDH problem. In this paper, we propose an online dictionary attack against Zheng et al.’ protocol, which an adversary can test more than one password in a session. If the number of users is few, this attack can not lead to security problem. However, if many users participate in this protocol, the security problem can not be ignored
Password-authenticated key exchange (PAKE) protocols allow two parties to share common secret keys i...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
AbstractWe study the security of password protocols against off-line dictionary attacks. In addition...
Abstract: In PKC 2006, Abdalla et al. proposed a password-based group key exchange protocol with con...
In PKC 2006, Abdalla et al. proposed a password-based group key exchange protocol with constant roun...
Abstract — Converting a secure group key agreement pro-tocol into password-based setting is not a tr...
AbstractIn 2009, Zheng et al. proposed an efficient password-based group key agreement protocol resi...
Password-based authenticated group key exchange protocols allow group users to jointly share a sessi...
AbstractKey exchange protocols are fundamental for establishing secure communication channels over p...
The use of passwords is a major point of vulnerablility in computer security as passwords are often ...
Password-Authenticated Key Exchange (PAKE) protocols enable two or more parties to use human-memorab...
When humans interact with machines in their daily networks, it is important that security of the com...
In this paper we show that the password-based Diffie-Hellman key exchange protocols due to Byun and ...
We study the security of password protocols against off-line dictionary attacks. In addition to the ...
SUMMARY Pairing based cryptography has been researched inten-sively due to its beneficial properties...
Password-authenticated key exchange (PAKE) protocols allow two parties to share common secret keys i...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
AbstractWe study the security of password protocols against off-line dictionary attacks. In addition...
Abstract: In PKC 2006, Abdalla et al. proposed a password-based group key exchange protocol with con...
In PKC 2006, Abdalla et al. proposed a password-based group key exchange protocol with constant roun...
Abstract — Converting a secure group key agreement pro-tocol into password-based setting is not a tr...
AbstractIn 2009, Zheng et al. proposed an efficient password-based group key agreement protocol resi...
Password-based authenticated group key exchange protocols allow group users to jointly share a sessi...
AbstractKey exchange protocols are fundamental for establishing secure communication channels over p...
The use of passwords is a major point of vulnerablility in computer security as passwords are often ...
Password-Authenticated Key Exchange (PAKE) protocols enable two or more parties to use human-memorab...
When humans interact with machines in their daily networks, it is important that security of the com...
In this paper we show that the password-based Diffie-Hellman key exchange protocols due to Byun and ...
We study the security of password protocols against off-line dictionary attacks. In addition to the ...
SUMMARY Pairing based cryptography has been researched inten-sively due to its beneficial properties...
Password-authenticated key exchange (PAKE) protocols allow two parties to share common secret keys i...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
AbstractWe study the security of password protocols against off-line dictionary attacks. In addition...