[1] |
SHIN J S , JO M , HWANG J Y ,et al. A verifier-based password-authenticated key exchange using tamper-proof hardware[J]. The Computer Journal, 2021,64(8): 1293-1302.
|
[2] |
汪定 . 口令安全关键问题研究[D]. 北京:北京大学, 2017.
|
|
WANG D . Research on key issues in password security[D]. Beijing:Peking University, 2017.
|
[3] |
SHOR P W , . Algorithms for quantum computation:discrete logarithms and factoring[C]// Proceedings of the 35th Annual Symposium on Foundations of Computer Science. Piscataway:IEEE Press, 1994: 124-134.
|
[4] |
叶茂 . 基于格的口令认证密钥交换协议和相关加密算法研究[D]. 郑州:信息工程大学, 2013.
|
|
YE M . Research on password-based authenticated key exchange protocols and associated encryption algorithms from lattices[D]. Zhengzhou:Information Engineering University, 2013.
|
[5] |
ASIF R . Post-quantum cryptosystems for Internet-of-things:a survey on lattice-based algorithms[J]. IoT, 2021,2(1): 71-91.
|
[6] |
ROY P S , DUTTA S , SUSILO W ,et al. Password protected secret sharing from Lattices[C]// Applied Cryptography and Network Security. Berlin:Springer, 2021: 442-459.
|
[7] |
HALEVI S , KRAWCZYK H . Public-key cryptography and password protocols[J]. ACM Transactions on Information and System Security, 1999,2(3): 230-268.
|
[8] |
GONG L , LOMAS M A , NEEDHAM R M ,et al. Protecting poorly chosen secrets from guessing attacks[J]. IEEE Journal on Selected Areas in Communications, 1993,11(5): 648-656.
|
[9] |
YI X , HAO F , BERTINO E . ID-based two-server password-authenticated key exchange[C]// Computer Security ESORICS 2014. Berlin:Springer, 2014: 257-276.
|
[10] |
YI X , RAO F Y , TARI Z ,et al. ID2S password-authenticated key exchange protocols[J]. IEEE Transactions on Computers, 2016,65(12): 3687-3701.
|
[11] |
RAIMONDO D M , GENNARO R . Provably secure threshold password-authenticated key exchange[J]. Journal of Computer and System Sciences, 2006,72(6): 978-1001.
|
[12] |
LI Z P , WANG D . Two-round PAKE protocol over lattices without NIZK[C]// Information Security and Cryptology. Berlin:Springer, 2019: 138-159.
|
[13] |
LI Z P , WANG D . Achieving one-round password-based authenticated key exchange over lattices[J]. IEEE Transactions on Services Computing, 2022,15(1): 308-321.
|
[14] |
BENHAMOUDA F , BLAZY O , DUCAS L ,et al. Hash proof systems over lattices revisited[C]// Public-Key Cryptography PKC 2018. Berlin:Springer, 2018: 644-674.
|
[15] |
ZHANG J , YU Y . Two-round PAKE from approximate SPH and instantiations from lattices[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2017: 37-67.
|
[16] |
KATZ J , MACKENZIE P , TABAN G ,et al. Two-server password-only authenticated key exchange[J]. Journal of Computer and System Sciences, 2012,78(2): 651-669.
|
[17] |
BELLOVIN S M , MERRITT M . Encrypted key exchange:password-based protocols secure against dictionary attacks[C]// Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy. Piscataway:IEEE Press, 1992: 72-84.
|
[18] |
KATZ J , OSTROVSKY R , YUNG M . Efficient password-authenticated key exchange using human-memorable passwords[C]// Lecture Notes in Computer Science. Berlin:Springer, 2001: 475-494.
|
[19] |
GENNARO R , LINDELL Y . A framework for password-based authenticated key exchange[J]. ACM Transactions on Information and System Security (TISSEC), 2006,9(2): 181-234.
|
[20] |
JIANG S Q , GONG G . Password based key exchange with mutual authentication[C]// International Workshop on Selected Areas in Cryptography. Berlin:Springer, 2004: 267-279.
|
[21] |
GROCE A , KATZ J . A new framework for efficient password-based authenticated key exchange[C]// Proceedings of the 17th ACM conference on Computer and communications security. New York:ACM Press, 2010: 516-525.
|
[22] |
ABDALLA M , BENHAMOUDA F , POINTCHEVAL D . Public-key encryption indistinguishable under plaintext-checkable attacks[J]. IET Information Security, 2016,10(6): 288-303.
|
[23] |
KATZ J , VAIKUNTANATHAN V . Round-optimal password-based authenticated key exchange[C]// Theory of Cryptography. Berlin:Springer, 2011: 293-310.
|
[24] |
KATZ J , VAIKUNTANATHAN V . Smooth projective hashing and password-based authenticated key exchange from lattices[C]// Advances in Cryptology - ASIACRYPT 2009. Berlin:Springer, 2009: 636-652.
|
[25] |
CRAMER R , SHOUP V . Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption[C]// Advances in Cryptology - EUROCRYPT 2002. Berlin:Springer, 2002: 45-64.
|
[26] |
PEIKERT C , VAIKUNTANATHAN V , WATERS B . A framework for efficient and composable oblivious transfer[C]// Advances in Cryptology - CRYPTO 2008 Berlin:Springer, 2008: 554-571.
|
[27] |
MICCIANCIO D , PEIKERT C . Trapdoors for lattices:simpler,tighter,faster,smaller[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2012: 700-718.
|
[28] |
BLAZY O , CHEVALIER C , DUCAS L ,et al. Exact smooth projective hash function based on LWE[R]. 2013.
|
[29] |
尹安琪, 曲彤洲, 郭渊博 ,等. 格上基于密文标准语言的可证明安全两轮口令认证密钥交换协议[J]. 电子学报, 2021:doi.org/10.12263/DZXB.20210517.
|
|
YIN A Q , QU T Z , GUO Y B ,et al. Provably secure two-round PAKE based on ciphertext standard language over lattices[J]. Acta Electronica Sinica, 2021:doi.org/10.12263/DZXB.20210517.
|
[30] |
BENHAMOUDA F , BLAZY O , CHEVALIER C ,et al. New techniques for SPHFs and efficient one-round PAKE protocols[C]// Advances in Cryptology-CRYPTO 2013. Berlin:Springer, 2013: 449-475.
|
[31] |
CANETTI R , GOLDREICH O , HALEVI S . The random oracle methodology,revisited[J]. Journal of the ACM, 2004,51(4): 557-594.
|
[32] |
ZHANG J , YU Y , FAN S Q ,et al. Improved lattice-based CCA2-secure PKE in the standard model[J]. Science China Information Sciences, 2020,63(8): 1-22.
|
[33] |
REGEV O . On lattices,learning with errors,random linear codes,and cryptography[J]. Journal of the ACM, 2009,56(6): 1-40.
|
[34] |
BELLARE M , POINTCHEVAL D , ROGAWAY P . Authenticated key exchange secure against dictionary attacks[C]// International conference on the theory and applications of cryptographic techniques. Berlin:Springer, 2000: 139-155.
|
[35] |
WANG D , CHENG H B , WANG P ,et al. Zipf’s law in passwords[J]. IEEE Transactions on Information Forensics and Security, 2017,12(11): 2776-2791.
|
[36] |
WANG D , WANG P . On the implications of Zipf’s law in passwords[C]// Computer Security - ESORICS 2016. Berlin:Spinger, 2016: 111-131.
|
[37] |
BAUM C , BOOTLE J , CERULLI A ,et al. Sub-linear lattice-based zero-knowledge arguments for arithmetic circuits[C]// Advances in Cryptology - CRYPTO 2018. Berlin:Springer, 2018: 669-699.
|