Back to Results
First PageMeta Content
Computing / Password-authenticated key agreement / Diffie–Hellman key exchange / XTR / Diffie–Hellman problem / File Transfer Protocol / Password / Password Authenticated Key Exchange by Juggling / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Data


A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol ? SeongHan Shin1 , Kazukuni Kobara1 , and Hideki Imai2,1 1 Research Center for Information Security (RCIS),
Add to Reading List

Document Date: 2008-12-21 19:36:43


Open Document

File Size: 335,16 KB

Share Result on Facebook

City

Otherwise / Tokyo / /

Company

C. In / CBC / Chiyoda / /

Country

Japan / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

Chuo University / National Institute of Advanced Industrial Science / store N / /

Holiday

Assumption / /

IndustryTerm

counterpart server / on-line dictionary / on-line dictionary attacks / resultant protocol / above protocol / passive server / keyword search / secure cryptographic protocols / secure passwordonly protocol / active server / honest-but-curious server / subsequent cryptographic algorithms / on-line attacks / on-line dictionary attack / computing / public networks / cryptographic protocol / web-mail servers / /

MarketIndex

TA / /

Organization

Password-Authenticated Key Exchange / SG / Research Center for Information Security / Chuo University / National Institute of Advanced Industrial Science and Technology / /

Person

Ai / Ci / /

Position

author / /

Product

Xj / S0 / Fig / Section / C1 / /

ProvinceOrState

Saskatchewan / /

Technology

anonymous PAKE protocols / subsequent cryptographic algorithms / clients Protocols / password-based protocols / resultant protocol / above protocol / key exchange protocol / threshold PAKE protocol / weak symmetric-key encryption / symmetric-key encryption / secure cryptographic protocols / APAKE protocol / AKE protocols / cryptographic protocol / TA-PAKE protocol / secret key / cryptography / D-NAPAKE protocol / 2-party PAKE protocols / proposed protocols / password-based AKE protocols / Our protocol / anonymous PAKE protocol / PAKE protocols / public-key encryption / application-oriented protocols / TAP protocol / PAKE protocol / 52 The TAP protocol / 2.2 Protocol / Anonymous Password-Authenticated Key Exchange Protocol / AKE protocol / /

SocialTag