2007
DOI: 10.1007/s11432-007-0034-5
|View full text |Cite
|
Sign up to set email alerts
|

Modular approach to the design and analysis of password-based security protocols

Abstract: In this paper, a general framework for designing and analyzing password-based security protocols is presented. First we introduce the concept of "weak computational indistinguishability" based on current progress of password-based security protocols. Then, we focus on cryptographic foundations for password-based security protocols, i.e., the theory of "weak pseudorandomness". Furthermore, based on the theory of weak pseudorandomness, we present a modular approach to design and analysis of password-based securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…KE protocols using a password avoid complicated key management and the password is easy to remember, so many client-server models use the password mechanism to verify the user's identity [6−11] . In 2007, Feng also mentioned a modular approach to design the password-based security protocols [12] . This kind of protocol is convenient for the user since he only needs to provide the password.…”
Section: Introductionmentioning
confidence: 99%
“…KE protocols using a password avoid complicated key management and the password is easy to remember, so many client-server models use the password mechanism to verify the user's identity [6−11] . In 2007, Feng also mentioned a modular approach to design the password-based security protocols [12] . This kind of protocol is convenient for the user since he only needs to provide the password.…”
Section: Introductionmentioning
confidence: 99%