Page 273 - 《软件学报》2020年第10期
P. 273

张启慧  等:改进的三方口令验证元认证密钥交换协议                                                        3249


         [10]    Gennaro R, Lindell Y. A framework for password-based authenticated key exchange. In: Biham E, ed. Proc. of the EUROCRYPT
             2003. Berlin, Heidelberg: Springer-Verlag, 2003. 524–543.
         [11]    Jiang S, Gong G. Password based key exchange with mutual authentication. In: Handschuh H, Hasan A, eds. Proc. of the Selected
             Areas in Cryptography. Berlin, Heidelberg: Springer-Verlag, 2005. 267–279.
         [12]    Hu XX, Zhang ZF, Liu WF. Universal composable password authenticated key exchange protocol in the standard model. Ruan Jian
             Xue Bao/Journal of Software, 2011,22(11):2820−2832 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3910.
             htm [doi: 10.3724/SP.J.1001.2011.03910]
         [13]    Benhamouda  F, Blazy O, Chevalier C,  Pointcheval D, Vergnaud D. New  techniques  for  SPHFs and efficient one-round  PAKE
             protocols. In: Canetti R, Garay JA, eds. Proc. of the CRYPTO 2013. Berlin, Heidelberg: Springer-Verlag, 2013. 449–475.
         [14]    Hu XX, Zhang  J, Zhang ZF, Xu  J. Universally composable anonymous  password authenticated key exchange.  Science China
             Information Sciences, 2017,60(5):52107.
         [15]    Chang CC, Chang YF.  A  novel  three-party encrypted  key exchange  protocol. Computer Standards &  Interfaces,  2004,26(5):
             471–476.
         [16]    Lu RX, Cao ZF. Simple three-party key exchange protocol. Computers & Security, 2007,26(1):94–97.
         [17]    Deng ML, Ma  JF, Le  FL. Universally composable  three  party  password-based  key exchange  protocol. China Communications,
             2009,6(3):150–155.
         [18]    Chang T, Hwang M, Yang W. A communication-efficient three-party password authenticated key exchange protocol. Information
             Sciences, 2011,181:217–226.
         [19]    Xiong H, Chen Y, Guan Z, Chen Z. Finding and fixing vulnerabilities in several three-party password authenticated key exchange
             protocols without server public keys. Information Sciences, 2013,235:329–340.
         [20]    Hu XX, Zhang ZZ, Zhang QH. Universally composable three-party password-authenticated key exchange with contributiveness.
             Int’l Journal of Communication Systems, 2015,28(6):1100–1111.
         [21]    Zhang QH, Hu XX, Wei JH, Liu WF. Universally composable three-party password authenticated key exchange. In: Sun X, Chao
             HC, eds. Proc. of the Int’l Conf. on Cloud Computing and Security. Cham: Springer-Verlag, 2017. 123–137.
         [22]    Wang D, Zhang Z, Wang P, Huang XY. Targeted online password guessing: An underestimated threat. In: Proc. of the 2016 ACM
             SIGSAC Conf. on CCS. ACM, 2016. 1242–1254.
         [23]    Gentry C, MacKenzie P, Ramzan Z. A method for making password-based key exchange resilient to server compromise. In: Dwork
             C, ed. Proc. of the CRYPTO 2006. Berlin, Heidelberg: Springer-Verlag, 2006. 142–159.
         [24]    Kiefer F, Manulis M. Zero-knowledge password policy checks and verifier-based PAKE. In: Kutyłowski M, Vaidya J, eds. Proc. of
             the European Symp. on Research in Computer Security. Cham: Springer-Verlag, 2014. 295–312.
         [25]    Benhamouda  F,  Pointcheval D. Verifier-based  password-authenticated  key exchange: New models and constructions.  IACR
             Cryptology ePrint Archive, 2013, https://eprint.iacr.org/2013/833.pdf
         [26]    Wang  D,  Cheng H,  Wang P,  Huang  XY.  A security  analysis of honeywords. In: Proc. of the Network  and Distributed Systems
             Security (NDSS) Symp. San Diego: The Internet Society, 2018. 1–16.
         [27]    Andrade ER, Simplicio MA, Barreto PS, Santos PCF. Lyra2: Efficient password hashing with high security against time-memory
             trade-offs. IEEE Trans. on Computers, 2016,65(10):3096–3108.
         [28]    Lai RW, Egger C, Schröder D, Chow SM. Phoenix: Rebirth of a cryptographic password-hardening service. In: Proc. of the 26th
             USENIX Security Symp. (USENIX Security 17). 2017. 899–916.
         [29]    Yang  XY,  Hou MB,  Wei XC. Verifier-based three-party password  authenticated key  exchange protocol. Journal of  Computer
             Research and Development, 2016,53(10):2230–2238 (in Chinese with English abstract).
         [30]    Cramer R, Shoup V.  Universal hash proofs  and  a paradigm  for  adaptive  chosen  ciphertext secure public-key  encryption. In:
             Knudsen LR, ed. Proc. of the EUROCRYPT 2002. Berlin, Heidelberg: Springer-Verlag, 2002. 45–64.
         [31]    Katz J,  Vaikuntanathan V.  Round optimal password based  authenticated key  exchange. In: Ishai  Y,  ed. Proc. of the  Theory of
             Cryptography Conf. Berlin, Heidelberg: Springer-Verlag, 2011. 293–310.
   268   269   270   271   272   273   274   275   276   277   278