Publication:
(Password) authenticated key establishment: From 2-party to group

dc.affiliation.dptoUC3M. Departamento de Matemáticases
dc.contributor.authorAbdalla, Michel
dc.contributor.authorBohli, Jens Matthias
dc.contributor.authorGonzález Vasco, María Isabel
dc.contributor.authorSteinwandt, Rainer
dc.contributor.funderEuropean Commissionen
dc.date.accessioned2023-06-02T11:05:28Z
dc.date.available2023-06-02T11:05:28Z
dc.date.issued2007
dc.descriptionProceedings of: TCC 2007: Fourth IACR Theory of Cryptography Conference, 21-24 February 2007, Amsterdam, The Netherlands.en
dc.description.abstractA protocol compiler is described, that transforms any provably secure authenticated 2-party key establishment into a provably secure authenticated group key establishment with 2 more rounds of communication. The compiler introduces neither idealizing assumptions nor high-entropy secrets, e.g., for signing. In particular, applying the compiler to a password-authenticated 2-party key establishment without random oracle assumption, yields a password-authenticated group key establishment without random oracle assumption. Our main technical tools are non-interactive and non-malleable commitment schemes that can be implemented in the common reference string (CRS) model.en
dc.description.sponsorshipThe first author was supported in part by the European Commission through the IST Program under Contract IST-2002-507932 ECRYPT and by France Telecom R&D as part of the contract CIDRE, between France Telecom R&D and École normale supérieure.en
dc.format.extent16
dc.identifier.bibliographicCitationAbdalla, M., Bohli, J., González Vasco, M. I., & Steinwandt, R. (21-24 February 2007). (Password) Authenticated Key Establishment: From 2-Party to Group [proceedings]. In Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands. Part of the Lecture Notes in Computer Science book series (LNSC,volume 4392).en
dc.identifier.doihttps://doi.org/10.1007/978-3-540-70936-7_27
dc.identifier.isbn978-3-540-70935-0
dc.identifier.publicationfirstpage499
dc.identifier.publicationlastpage514
dc.identifier.publicationtitleTheory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedingsen
dc.identifier.publicationvolume4392
dc.identifier.urihttps://hdl.handle.net/10016/37416
dc.identifier.uxxiCC/0000034121
dc.language.isoeng
dc.publisherSpringeren
dc.relation.eventdate2007-02-21
dc.relation.eventplacePaises Bajoses
dc.relation.eventtitleTCC 2007: Fourth IACR Theory of Cryptography Conferenceen
dc.relation.ispartofseriesLecture Notes in Computer Science (Book Series)en
dc.relation.projectIDinfo:eu-repo/grantAgreement/EC/507932
dc.rights© 2007 Springer Berlin Heidelbergen
dc.rights.accessRightsopen accessen
dc.subject.ecienciaInformáticaes
dc.subject.ecienciaMatemáticases
dc.subject.otherCommon reference string modelen
dc.subject.otherKey establishmenten
dc.subject.otherPassword-based authenticationen
dc.subject.otherProtocol compileren
dc.title(Password) authenticated key establishment: From 2-party to groupen
dc.typeconference proceedings*
dc.type.hasVersionAM*
dspace.entity.typePublication
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Password_TCC_2007_ps.pdf
Size:
512.94 KB
Format:
Adobe Portable Document Format
Description: