Privacy-Preserving Authenticated Key Exchange (PPAKE) provides protection both for the session keys and the identity information of the involved parties. In this paper, we introduce the concept of robustness into PPAKE. Robustness enables each user to confirm whether itself is the target recipient of the first round message in the protocol. With the help of robustness, a PPAKE protocol can successfully avoid the heavy redundant communications and computations caused by the ambiguity of communicants in the existing PPAKE, especially in broadcast channels. We propose a generic construction of robust PPAKE from key encapsulation mechanism (KEM), digital signature (SIG), message authentication code (MAC), pseudo-random generator (PRG) and sym...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
We propose a generic construction of 2-pass authenticated key exchange (AKE) scheme with explicit au...
When humans interact with machines in their daily networks, it is important that security of the com...
Authenticated key-exchange (AKE) protocols are an important class of protocols that allow two partie...
In this paper, we present a strong, formal, and general-purpose cryptographic model for privacy-pres...
Password-Authenticated Key Exchange (PAKE) protocols allow two parties that only share a password to...
An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure proto...
Lightweight authenticated key exchange (AKE) protocols based on symmetric-key cryptography are impor...
We propose a generic construction of password-based authenticated key exchange (PAKE) from key encap...
This paper gives definitions and results about password-based protocols for authenticated key exchan...
In this paper, we present a single round two-party {\em attribute-based authenticated key exchange} ...
We revisit the notions of robustness introduced by Abdalla, Bellare, and Neven (TCC 2010). One of th...
For the past three decades, a wide variety of cryptographic protocols have been proposed to solve se...
The original publication is available at www.springerlink.comInternational audienceIn Asiacrypt 2005...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
We propose a generic construction of 2-pass authenticated key exchange (AKE) scheme with explicit au...
When humans interact with machines in their daily networks, it is important that security of the com...
Authenticated key-exchange (AKE) protocols are an important class of protocols that allow two partie...
In this paper, we present a strong, formal, and general-purpose cryptographic model for privacy-pres...
Password-Authenticated Key Exchange (PAKE) protocols allow two parties that only share a password to...
An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure proto...
Lightweight authenticated key exchange (AKE) protocols based on symmetric-key cryptography are impor...
We propose a generic construction of password-based authenticated key exchange (PAKE) from key encap...
This paper gives definitions and results about password-based protocols for authenticated key exchan...
In this paper, we present a single round two-party {\em attribute-based authenticated key exchange} ...
We revisit the notions of robustness introduced by Abdalla, Bellare, and Neven (TCC 2010). One of th...
For the past three decades, a wide variety of cryptographic protocols have been proposed to solve se...
The original publication is available at www.springerlink.comInternational audienceIn Asiacrypt 2005...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
We propose a generic construction of 2-pass authenticated key exchange (AKE) scheme with explicit au...
When humans interact with machines in their daily networks, it is important that security of the com...