Publication: (Password) authenticated key establishment: From 2-party to group
dc.affiliation.dpto | UC3M. Departamento de Matemáticas | es |
dc.contributor.author | Abdalla, Michel | |
dc.contributor.author | Bohli, Jens Matthias | |
dc.contributor.author | González Vasco, María Isabel | |
dc.contributor.author | Steinwandt, Rainer | |
dc.contributor.funder | European Commission | en |
dc.date.accessioned | 2023-06-02T11:05:28Z | |
dc.date.available | 2023-06-02T11:05:28Z | |
dc.date.issued | 2007 | |
dc.description | Proceedings of: TCC 2007: Fourth IACR Theory of Cryptography Conference, 21-24 February 2007, Amsterdam, The Netherlands. | en |
dc.description.abstract | A protocol compiler is described, that transforms any provably secure authenticated 2-party key establishment into a provably secure authenticated group key establishment with 2 more rounds of communication. The compiler introduces neither idealizing assumptions nor high-entropy secrets, e.g., for signing. In particular, applying the compiler to a password-authenticated 2-party key establishment without random oracle assumption, yields a password-authenticated group key establishment without random oracle assumption. Our main technical tools are non-interactive and non-malleable commitment schemes that can be implemented in the common reference string (CRS) model. | en |
dc.description.sponsorship | The first author was supported in part by the European Commission through the IST Program under Contract IST-2002-507932 ECRYPT and by France Telecom R&D as part of the contract CIDRE, between France Telecom R&D and École normale supérieure. | en |
dc.format.extent | 16 | |
dc.identifier.bibliographicCitation | Abdalla, M., Bohli, J., González Vasco, M. I., & Steinwandt, R. (21-24 February 2007). (Password) Authenticated Key Establishment: From 2-Party to Group [proceedings]. In Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands. Part of the Lecture Notes in Computer Science book series (LNSC,volume 4392). | en |
dc.identifier.doi | https://doi.org/10.1007/978-3-540-70936-7_27 | |
dc.identifier.isbn | 978-3-540-70935-0 | |
dc.identifier.publicationfirstpage | 499 | |
dc.identifier.publicationlastpage | 514 | |
dc.identifier.publicationtitle | Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings | en |
dc.identifier.publicationvolume | 4392 | |
dc.identifier.uri | https://hdl.handle.net/10016/37416 | |
dc.identifier.uxxi | CC/0000034121 | |
dc.language.iso | eng | |
dc.publisher | Springer | en |
dc.relation.eventdate | 2007-02-21 | |
dc.relation.eventplace | Paises Bajos | es |
dc.relation.eventtitle | TCC 2007: Fourth IACR Theory of Cryptography Conference | en |
dc.relation.ispartofseries | Lecture Notes in Computer Science (Book Series) | en |
dc.relation.projectID | info:eu-repo/grantAgreement/EC/507932 | |
dc.rights | © 2007 Springer Berlin Heidelberg | en |
dc.rights.accessRights | open access | en |
dc.subject.eciencia | Informática | es |
dc.subject.eciencia | Matemáticas | es |
dc.subject.other | Common reference string model | en |
dc.subject.other | Key establishment | en |
dc.subject.other | Password-based authentication | en |
dc.subject.other | Protocol compiler | en |
dc.title | (Password) authenticated key establishment: From 2-party to group | en |
dc.type | conference proceedings | * |
dc.type.hasVersion | AM | * |
dspace.entity.type | Publication |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Password_TCC_2007_ps.pdf
- Size:
- 512.94 KB
- Format:
- Adobe Portable Document Format
- Description: