共 29 条
[1]
BELLOVIN S M, MERRITT M., Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 72-84, (1992)
[2]
VASCO M I G, POZO A L P D, SORIENTE C., A key for John Doe: modeling and designing anonymous password-authenticated key exchange protocols, IEEE Transactions on Dependable and Secure Computing, 18, 3, pp. 1336-1353, (2021)
[3]
BRADLEY T, JARECKI S, XU J., Strong asymmetric PAKE based on trapdoor CKEM, 2019 Advances in Cryptology, pp. 798-825, (2019)
[4]
ABDALLA M, BARBOSA M, BRADLEY T, Et al., Universally composable relaxed password authenticated key exchange, 2020 Advances in Cryptology, pp. 278-307, (2020)
[5]
KATZ J, VAIKUNTANATHAN V., Round-optimal password-based authenticated key exchange, Journal of Cryptology, 26, 4, pp. 714-743, (2013)
[6]
KATZ J, VAIKUNTANATHAN V., Smooth projective hashing and password-based authenticated key exchange from lattices, 2009 Advances in Cryptology, pp. 636-652, (2009)
[7]
GENNARO R, LINDELL Y., A framework for password-based authenticated key exchange1, ACM Transactions on Information and System Security (TISSEC), 9, 2, pp. 181-234, (2006)
[8]
DING Y, FAN L., Efficient password-based authenticated key exchange from lattices, 2012 Seventh International Conference on Computational Intelligence and Security, pp. 934-938, (2012)
[9]
GROCE A, KATZ J., A new framework for efficient password-based authenticated key exchange, Proceedings of the 17th ACM conference on Computer and communications security, pp. 516-525, (2010)
[10]
DING J, ALSAYIGH S, LANCRENON J, Et al., Provably secure password authenticated key exchange based on RLWE for the post-quantum world, 2017 Cryptographers' Track at the RSA Conference, pp. 183-204, (2017)