File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-319-64200-0_14
- Scopus: eid_2-s2.0-85028450986
- WOS: WOS:000455355700014
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: IND-PCA secure KEM is enough for password-based authenticated key exchange
Title | IND-PCA secure KEM is enough for password-based authenticated key exchange |
---|---|
Authors | |
Keywords | IND-PCA secure KEM Password-based authenticated key exchange Smooth projective hash functions |
Issue Date | 2017 |
Publisher | Springer |
Citation | 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017. In Obana, S, Chida, K (Eds), Advances in Information and Computer Security : 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings, p. 231-241. Cham, Switzerland : Springer, 2017 How to Cite? |
Abstract | There are several frameworks for password-based authenticated key exchange (PAKE) protocols with common reference string following the work of Katz, Ostrovsky and Yung (Eurocrypt’01), and it seems that the IND-CCA secure encryption is inevitable when constructing PAKE in standard model. In this paper, we show that IND-PCA secure key encapsulation mechanism (KEM) is enough for PAKE, which is weaker and easier to be constructed than IND-CCA secure encryption. Our refined PAKE consists of a smooth projective hash function on IND-CPA secure encryption and an IND-PCA secure KEM. Based on DDH assumption, the total communication of PAKE consists of 6 group elements and log |D| (D is the set of password) bits, while before this, the most efficient PAKE contains 7 group elements. |
Persistent Identifier | http://hdl.handle.net/10722/312025 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
ISI Accession Number ID | |
Series/Report no. | Lecture Notes in Computer Science ; 10418 LNCS sublibrary. SL 4, Security and Cryptology |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xue, Haiyang | - |
dc.contributor.author | Li, Bao | - |
dc.contributor.author | Lu, Xianhui | - |
dc.date.accessioned | 2022-04-06T04:32:00Z | - |
dc.date.available | 2022-04-06T04:32:00Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017. In Obana, S, Chida, K (Eds), Advances in Information and Computer Security : 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings, p. 231-241. Cham, Switzerland : Springer, 2017 | - |
dc.identifier.isbn | 9783319641997 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/312025 | - |
dc.description.abstract | There are several frameworks for password-based authenticated key exchange (PAKE) protocols with common reference string following the work of Katz, Ostrovsky and Yung (Eurocrypt’01), and it seems that the IND-CCA secure encryption is inevitable when constructing PAKE in standard model. In this paper, we show that IND-PCA secure key encapsulation mechanism (KEM) is enough for PAKE, which is weaker and easier to be constructed than IND-CCA secure encryption. Our refined PAKE consists of a smooth projective hash function on IND-CPA secure encryption and an IND-PCA secure KEM. Based on DDH assumption, the total communication of PAKE consists of 6 group elements and log |D| (D is the set of password) bits, while before this, the most efficient PAKE contains 7 group elements. | - |
dc.language | eng | - |
dc.publisher | Springer | - |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.relation.ispartofseries | Lecture Notes in Computer Science ; 10418 | - |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and Cryptology | - |
dc.subject | IND-PCA secure KEM | - |
dc.subject | Password-based authenticated key exchange | - |
dc.subject | Smooth projective hash functions | - |
dc.title | IND-PCA secure KEM is enough for password-based authenticated key exchange | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-319-64200-0_14 | - |
dc.identifier.scopus | eid_2-s2.0-85028450986 | - |
dc.identifier.spage | 231 | - |
dc.identifier.epage | 241 | - |
dc.identifier.eissn | 1611-3349 | - |
dc.identifier.isi | WOS:000455355700014 | - |
dc.publisher.place | Cham, Switzerland | - |