EC2C-PAKA: An efficient client-to-client password-authenticated key agreement

JW Byun, DH Lee, JI Lim - Information Sciences, 2007 - Elsevier
Most password-authenticated key agreement schemes described in the literature have
focused on authenticated key agreement using a shared password between a client and a …

Cross-domain password-based authenticated key exchange revisited

L Chen, HW Lim, G Yang - ACM Transactions on Information and System …, 2014 - dl.acm.org
We revisit the problem of secure cross-domain communication between two users belonging
to different security domains within an open and distributed environment. Existing …

[PDF][PDF] Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model.

H Zhu, Y Zhang, Y **a, H Li - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Nowadays, the overwhelming majority of passwordauthenticated key agreement protocols
using chaotic maps are based on three architectures (client/server, two clients/server and …

Key establishment: Proofs and refutations

KKR Choo - 2006 - eprints.qut.edu.au
We study the problem of secure key establishment. We critically examine the security
models of Bellare and Rogaway (1993) and Canetti and Krawczyk (2001) in the …

A secure and efficient password‐authenticated group key exchange protocol for mobile ad hoc networks

D He, C Chen, M Ma, S Chan… - International Journal of …, 2013 - Wiley Online Library
Password‐authenticated group key exchange protocols enable communication parties to
establish a common secret key (a session key) by only using short secret passwords. Such …

Efficient provably secure password-based explicit authenticated key agreement

O Ruan, N Kumar, D He, JH Lee - Pervasive and Mobile Computing, 2015 - Elsevier
A password-based authenticated key agreement enables several parties to establish a
shared cryptographically strong key over a public unreliable and insecure network using …

[PDF][PDF] A Provably Password Authenticated Key Exchange Scheme Based on Chaotic Maps in Different Realm.

H Zhu, Y Zhang, Y Zhang - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Until now, the overwhelming majority of passwordauthenticated key agreement protocols
using chaotic maps are based on three architectures (client/server, two clients/server and …

Secure cross-realm C2C-PAKE protocol

Y Yin, L Bao - Australasian Conference on Information Security and …, 2006 - Springer
Client-to-client password authenticated key exchange (C2C-PAKE) protocol deals with the
authenticated key exchange process between two clients, who only share their passwords …

A new client-to-client password-authenticated key agreement protocol

DG Feng, J Xu - … and Cryptology: Second International Workshop, IWCC …, 2009 - Springer
Client-to-client password-authenticated key agreement (C2C-PAKA) protocol deals with the
authenticated key agreement process between two clients of different realms, who only …

Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols

RCW Phan, BM Goi - Progress in Cryptology-INDOCRYPT 2006: 7th …, 2006 - Springer
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow parties to share
secret keys in an authentic manner based on an easily memorizable password. Byun et al …