2014
DOI: 10.1007/978-3-319-11212-1_15
|View full text |Cite
|
Sign up to set email alerts
|

ID-Based Two-Server Password-Authenticated Key Exchange

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…In 2014, Yi et al . designed a general construction method to convert a two‐party password protocol into a two‐server password protocol using an identity‐based encryption scheme [20]. In 2014, Kiefer and Manulis put forward the concept of distributed smoothed projection hash function and proposed a framework of two‐server password authentication key exchange protocol by using distributed smoothed projection hash function [21].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2014, Yi et al . designed a general construction method to convert a two‐party password protocol into a two‐server password protocol using an identity‐based encryption scheme [20]. In 2014, Kiefer and Manulis put forward the concept of distributed smoothed projection hash function and proposed a framework of two‐server password authentication key exchange protocol by using distributed smoothed projection hash function [21].…”
Section: Related Workmentioning
confidence: 99%
“…In terms of communication bandwidth, the bandwidth of our proposal is better than the Yi et al . 's protocol [20], but slightly higher than other related protocols (Table 3).…”
Section: Performance Evaluationmentioning
confidence: 99%
“…These protocols actually remain secure when executed with all-corrupt servers, but are restricted to the cases that n > 3t and (t, n) = (1, 2). Based on identity-based encryption (IBE), an 1-out-of-2 protocol where the client is required to remember the identities of the two servers besides his or her password, was proposed by Yi et al [19].…”
Section: Introductionmentioning
confidence: 99%
“…Yi et al gave a symmetric solution [34] which is even more efficient than asymmetric protocols [21], [29], [30], [31]. Recently, Yi et al constructed an ID2S PAKE protocol with the identity-based encryption scheme (IBE) [35].…”
Section: Introductionmentioning
confidence: 99%