2009
DOI: 10.1007/978-3-642-02384-2_16
|View full text |Cite
|
Sign up to set email alerts
|

Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness

Abstract: Abstract. Adaptively-secure key exchange allows the establishment of secure channels even in the presence of an adversary that can corrupt parties adaptively and obtain their internal states. In this paper, we give a formal definition of contributory protocols and define an ideal functionality for password-based group key exchange with explicit authentication and contributiveness in the UC framework. As with previous definitions in the same framework, our definitions do not assume any particular distribution o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
33
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 14 publications
(33 citation statements)
references
References 37 publications
0
33
0
Order By: Relevance
“…This is also a necessary assumption for realizing PAKE schemes in the UC framework as shown by [19]. Like [5], our protocol achieves a strong 2 notion of contributiveness in the UC framework. In particular, even if it can control all the network communications, the adversary cannot bias the key as long as one of the players involved in the protocol is honest.…”
Section: Introductionmentioning
confidence: 81%
See 4 more Smart Citations
“…This is also a necessary assumption for realizing PAKE schemes in the UC framework as shown by [19]. Like [5], our protocol achieves a strong 2 notion of contributiveness in the UC framework. In particular, even if it can control all the network communications, the adversary cannot bias the key as long as one of the players involved in the protocol is honest.…”
Section: Introductionmentioning
confidence: 81%
“…With few exceptions (e.g., [1]), most protocols in this setting are built from scratch and are quite complex. Among these protocols, we can clearly identify two types of protocols: constant-round protocols (e.g., [8,14,5]) and those whose number of communication rounds depends on the number of users involved in the protocol execution (e.g., [15]). Since constant-round protocols are generally easier to implement and less susceptible to synchronization problems when the number of user increases, we focus our attention on these protocols.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations