2000
DOI: 10.1007/3-540-45539-6_12
|View full text |Cite
|
Sign up to set email alerts
|

Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman

Abstract: Abstract. When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow any information to be leaked that would allow verification of the password (a weak shared key), since an attacker who obtains this information may be able to run an off-line dictionary attack to determine the correct password. We present a new protocol called PAK which is the first Diffie-Hellman-based passwordauthenticated key excha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

2
378
0
4

Year Published

2001
2001
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 550 publications
(384 citation statements)
references
References 27 publications
2
378
0
4
Order By: Relevance
“…More recently, two formal models for password-authenticated key exchange have been proposed: one by Bellare, Pointcheval, and Rogaway [3], based on [4,6] with extensions suggested by [21]; and a second by Boyko, MacKenzie, and Patel [10], following [2] with extensions given in [28]. While both models have their advantages, we choose to work in the first model and review the appropriate definitions in Section 2.…”
Section: Previous Workmentioning
confidence: 99%
See 4 more Smart Citations
“…More recently, two formal models for password-authenticated key exchange have been proposed: one by Bellare, Pointcheval, and Rogaway [3], based on [4,6] with extensions suggested by [21]; and a second by Boyko, MacKenzie, and Patel [10], following [2] with extensions given in [28]. While both models have their advantages, we choose to work in the first model and review the appropriate definitions in Section 2.…”
Section: Previous Workmentioning
confidence: 99%
“…Only recently have formal validations of security for specific protocols appeared [3,10,22]. However, these validations are not proofs in the standard model; [3] relies on ideal ciphers, while [10,22] rely on random oracles.…”
Section: Previous Workmentioning
confidence: 99%
See 3 more Smart Citations