[1] |
BELLOIN S M , MERRITT M . Encrypted key exchange:passsword-based protocols secure against dictionarry attacks[C]// IEEE Symposium o on Research in Seccurity and Privacy. 1992: 72-84.
|
[2] |
KATZ J , OSTROVSKY R , YU NG M . Efficient pa assword-authenticated key exchangge using human-memorable passworrds[M]. Advances in Cryptology-EUROCRYPT. 20001: 475-494.
|
[3] |
ZHAO J , GU D . Provably secure three-party password-based authe enticated key eexchange protocol[J]. Information Sciiences, 2012,184(11): 310-323.
|
[4] |
FARASH M S , ISLAM S H , OBAIDAT M S . A provably secure and efficient two-party password‐based explicit authennticated key exchan ge protocol resiistance to passworrd guessing attackss[J]. Concurrency &Computation Practice & Experieence, 2015,27(17): 4897-4913.
|
[5] |
ABLALLA M , BENHAMOUDA F , MACKENZ IIE P . Security of the J-PAKE passsword-authenticateed key exchangee protocol[C]// IE EE Symposium oon Security and Priivacy. 2015: 571-5887.
|
[6] |
魏福山, 马建峰, 李光松 ,等. 标准模型下高效的三方口令认证密钥交换协议[[J]. 软件学报, 2016,27(9): 2389-2399.
|
|
WEI F S , MA J F , LI G S ,et al. Efficient three-party password-based authenticatedd key exchange prootocol in the standaard model[J]. Journ nal of Software, 2016,27(9): 2389-2399.
|
[7] |
KATZ J , VAIKUNTANATH AN V . Smooth proojective hashing and password-bassed authenticated key exchange froom lattices[M]. Advances in Cry yptology-ASIACRYPT. 2009: 636-652.
|
[8] |
GENNARO R , LINDELL Y . A framework for password-based autheenticated key e exchange[C]// Internnational Conference on the Theory annd Applications of Cryptographic Techniques. 2003: 5524-543.
|
[9] |
DING Y , FAN L . Efficient ppassword-based authenticated key exchange from lattices[C]// Seventth International Coonference on Compputational Intellligence and Securitty. 2012: 934-938.
|
[10] |
GROCE A , KATZ J . A new fr ramework for efficcient password-baseed authenticated key exchange[C]// /Proceedings of thhe 17th ACM confe erence on Computer and communnications security. 2010:516-525.
|
[11] |
叶茂, 胡学先, 刘文芬 . 基于格的三方口令认证密钥交换协议[J]. 电子与信息学报, 2013,35(6): 1376-1381.
|
|
YE M , HU X X , LIU W F . Pas sword authenticateed key exchange protocol in the three party settingg based on lattices[J]. Journal of Eleectronics & Infformation Technoloogy, 2013,35(6): 1376-1381.
|
[12] |
PEIKERT C . Lattice cryptograpphy for the internet[M]. Post-Quantuum Cryptographyy. 2014: 197-219.
|
[13] |
ZHANG J , ZHANG Z , DING J ,et al. Authentiicated key exchang ge from ideal latttices[M]. Advancees in Cryptology -EUROCRYPT. 2015: 719-751.
|
[14] |
赵秀凤, 高海英, 王爱兰 . 基于 RLWE 的身份基认证密钥交换协议[J]. 计算机研究与发展, 2016,53(11): 2482-2490.
|
|
ZHAO X F , GAO H Y , WANG A L . An identity-based auuthenticated key exchange protocoll from RLWE[J]. JJournal of Compute er Research and Development, 2016,53(11): 2482-2449
|
[15] |
XU D Q , HE D B , CHOO K K R . Prov vably secure three-party passworrd authenticated keyy exchange protocool based on ring leaarning with erroor[C]// IACR Cryptoology ePrint Archivve. 2017:360.
|
[16] |
ZHANG J , YU Y . Two-round PAKE fro om approximate SPH and instanntiations from latticces[C]// International Conference on the Theory and Application of Cryyptology and Infor mation Security. 2017: 37-67.
|
[17] |
REGEV O , . On latticess,learning with errrors,random linear codes,and crypptography[C]// ACM Symposium on Theory of Compu uting. 2005: 84-993.
|
[18] |
BE LLARE M , POIN TCHEVAL D , ROGAWAY P . Authen nticated key exchhange secure againnst dictionary attaccks[M]. Advances in Cryptologyy-EUROCRYPT. 2000: 139-155.
|
[19] |
ABE M , CUI Y , IMAI H ,et al. Efficient hybrid encryption froom ID-based encr ryption[J]. Designs Codes & Cryptograpphy, 2010,54(3): 205-240.
|
[20] |
RAN C , HALEVI S , KATZ J . Chosen-ciiphertext security from identity-bbased encryption[C]// International Coonference on the Theory and Appplications of Cryptoographic Techniquees. 2004: 207-222.
|
[21] |
CRAMER R , SHOUP V . Universal hassh proofs and a paradigm for adapptive chosen cipheertext secure publicc-key encryption[C]// Internationnal Conference on the Theory and Applications of Cryyptographic Tech hniques:Advances in Cryptology. 2002: 45-64.
|
[22] |
KA TZ J , VAIKUNTANATHAN V . Round-optimal password-based authennticated key exchangge[M]. Theory of Cryyptography. 2011: 293-310.
|