Page 273 - 《软件学报》2020年第10期
P. 273
张启慧 等:改进的三方口令验证元认证密钥交换协议 3249
[10] Gennaro R, Lindell Y. A framework for password-based authenticated key exchange. In: Biham E, ed. Proc. of the EUROCRYPT
2003. Berlin, Heidelberg: Springer-Verlag, 2003. 524–543.
[11] Jiang S, Gong G. Password based key exchange with mutual authentication. In: Handschuh H, Hasan A, eds. Proc. of the Selected
Areas in Cryptography. Berlin, Heidelberg: Springer-Verlag, 2005. 267–279.
[12] Hu XX, Zhang ZF, Liu WF. Universal composable password authenticated key exchange protocol in the standard model. Ruan Jian
Xue Bao/Journal of Software, 2011,22(11):2820−2832 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3910.
htm [doi: 10.3724/SP.J.1001.2011.03910]
[13] Benhamouda F, Blazy O, Chevalier C, Pointcheval D, Vergnaud D. New techniques for SPHFs and efficient one-round PAKE
protocols. In: Canetti R, Garay JA, eds. Proc. of the CRYPTO 2013. Berlin, Heidelberg: Springer-Verlag, 2013. 449–475.
[14] Hu XX, Zhang J, Zhang ZF, Xu J. Universally composable anonymous password authenticated key exchange. Science China
Information Sciences, 2017,60(5):52107.
[15] Chang CC, Chang YF. A novel three-party encrypted key exchange protocol. Computer Standards & Interfaces, 2004,26(5):
471–476.
[16] Lu RX, Cao ZF. Simple three-party key exchange protocol. Computers & Security, 2007,26(1):94–97.
[17] Deng ML, Ma JF, Le FL. Universally composable three party password-based key exchange protocol. China Communications,
2009,6(3):150–155.
[18] Chang T, Hwang M, Yang W. A communication-efficient three-party password authenticated key exchange protocol. Information
Sciences, 2011,181:217–226.
[19] Xiong H, Chen Y, Guan Z, Chen Z. Finding and fixing vulnerabilities in several three-party password authenticated key exchange
protocols without server public keys. Information Sciences, 2013,235:329–340.
[20] Hu XX, Zhang ZZ, Zhang QH. Universally composable three-party password-authenticated key exchange with contributiveness.
Int’l Journal of Communication Systems, 2015,28(6):1100–1111.
[21] Zhang QH, Hu XX, Wei JH, Liu WF. Universally composable three-party password authenticated key exchange. In: Sun X, Chao
HC, eds. Proc. of the Int’l Conf. on Cloud Computing and Security. Cham: Springer-Verlag, 2017. 123–137.
[22] Wang D, Zhang Z, Wang P, Huang XY. Targeted online password guessing: An underestimated threat. In: Proc. of the 2016 ACM
SIGSAC Conf. on CCS. ACM, 2016. 1242–1254.
[23] Gentry C, MacKenzie P, Ramzan Z. A method for making password-based key exchange resilient to server compromise. In: Dwork
C, ed. Proc. of the CRYPTO 2006. Berlin, Heidelberg: Springer-Verlag, 2006. 142–159.
[24] Kiefer F, Manulis M. Zero-knowledge password policy checks and verifier-based PAKE. In: Kutyłowski M, Vaidya J, eds. Proc. of
the European Symp. on Research in Computer Security. Cham: Springer-Verlag, 2014. 295–312.
[25] Benhamouda F, Pointcheval D. Verifier-based password-authenticated key exchange: New models and constructions. IACR
Cryptology ePrint Archive, 2013, https://eprint.iacr.org/2013/833.pdf
[26] Wang D, Cheng H, Wang P, Huang XY. A security analysis of honeywords. In: Proc. of the Network and Distributed Systems
Security (NDSS) Symp. San Diego: The Internet Society, 2018. 1–16.
[27] Andrade ER, Simplicio MA, Barreto PS, Santos PCF. Lyra2: Efficient password hashing with high security against time-memory
trade-offs. IEEE Trans. on Computers, 2016,65(10):3096–3108.
[28] Lai RW, Egger C, Schröder D, Chow SM. Phoenix: Rebirth of a cryptographic password-hardening service. In: Proc. of the 26th
USENIX Security Symp. (USENIX Security 17). 2017. 899–916.
[29] Yang XY, Hou MB, Wei XC. Verifier-based three-party password authenticated key exchange protocol. Journal of Computer
Research and Development, 2016,53(10):2230–2238 (in Chinese with English abstract).
[30] Cramer R, Shoup V. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In:
Knudsen LR, ed. Proc. of the EUROCRYPT 2002. Berlin, Heidelberg: Springer-Verlag, 2002. 45–64.
[31] Katz J, Vaikuntanathan V. Round optimal password based authenticated key exchange. In: Ishai Y, ed. Proc. of the Theory of
Cryptography Conf. Berlin, Heidelberg: Springer-Verlag, 2011. 293–310.