Back to Results
First PageMeta Content
Password / Challenge-response authentication / Diffie–Hellman key exchange / Public-key cryptography / Password Authenticated Key Exchange by Juggling / Zero-knowledge password proof / Cryptographic protocols / Cryptography / Password-authenticated key agreement


Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon† , Ik Rae Jeong§ , Kouichi Sakurai‡ , and Dong Hoon Lee† † Center for Information Security Technologies (CIST), Korea Unive
Add to Reading List

Document Date: 2006-12-25 07:03:53


Open Document

File Size: 385,70 KB

Share Result on Facebook

Company

Uis / Information Security Technologies / TestGroup / /

Country

Japan / Korea / /

/

Event

FDA Phase / /

Facility

Kyushu University / Korea University / /

IndustryTerm

security infrastructure / secure pake-kk protocol / forward-secure key exchange protocol / malicious server / secure pake-kss&fs protocol / secure protocols / secure pake-kk&fs protocol / password-authenticated multi-party key exchange protocol / wireless network / insecure public network / storage device / secure pake-kss&kk&fs protocol / on-line dictionary attacks / broadcast network / undetectable on-line attacks / secure pake protocol / undetectable on-line dictionary attacks / secure pake-kss&kk protocol / secure key exchange protocol / multicast networks / undetectable and detectable on-line dictionary attacks / cryptographic protocols / wireless applications / secure protocol / secure solution / detectable on-line dictionary attacks / on-line attacks / broadcast networks / synchronous network / detectable and undetectable on-line dictionary attacks / malicious / accessed systems / unicast networks / partnering for broadcast networks / /

MusicAlbum

Test / Corrupt / Execute / Reveal / /

Organization

EKE-M / Korea University / Department of Computer Science and Communication Engineering / PAKE / Kyushu University / Department of Defense / /

Person

Rae Jeong / Dong Hoon Lee / Jeong Ok Kwon / /

/

Product

PAMKE1 / PAMKE2 / /

Technology

secure pake-kk protocol / second protocol / resulting protocols / unforgeable MAC algorithm / secure multi-party PAKE protocol / password-authenticated multi-party key exchange protocol / key exchange protocol / FS protocol / peer-to-peer / PKI / server-aided PAKE protocols / provably secure protocol / key exchange protocols / previous protocols / block cipher / DOD protocol / provably secure protocols / multi-party PAKE protocol / two protocols / secret key / N-party EKE-U protocol / UDOD protocol / related protocols / secure key exchange protocol / secure pake-kk&fs protocol / KK protocol / PAKE protocols / secure pake protocol / secure pake-kss&fs protocol / KSS protocol / 4 Multi-Party PAKE Protocols / secure pake-kss&kk&fs protocol / forward-secure key exchange protocol / multi-party PAKE protocols / PAKE protocol / constant-round multi-party PAKE protocols / server-aided PAKE protocol / MAC algorithm / Constant-round PAKE protocols / secure pake-kss&kk protocol / /

SocialTag