Sciweavers

2472 search results - page 14 / 495
» Parallel Key Exchange
Sort
View
CCS
2006
ACM
14 years 2 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
EUC
2008
Springer
14 years 5 days ago
Efficient Client-to-Client Password Authenticated Key Exchange
With the rapid proliferation of client-to-client applications, PAKE (password authenticated key exchange) protocols in the client-to-client setting become increasingly important. ...
Yanjiang Yang, Feng Bao, Robert H. Deng
CCS
2008
ACM
14 years 12 days ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
JOC
2006
77views more  JOC 2006»
13 years 10 months ago
An Improved Real-Quadratic-Field-Based Key Exchange Procedure
To date, the only non-group structure that has been suitably employed as the key space for Diffie-Hellman type cryptographic key exchange is the infrastructure of a real quadratic ...
Michael J. Jacobson Jr., Renate Scheidler, Hugh C....
JCP
2006
120views more  JCP 2006»
13 years 10 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio