Credential Authenticated Identification and Key Exchange
- 1 January 2010
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Credential Authenticated Identification and Key ExchangeLecture Notes in Computer Science, 2010
- Smooth Projective Hashing for Conditionally Extractable CommitmentsLecture Notes in Computer Science, 2009
- Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key ExchangeLecture Notes in Computer Science, 2008
- A Method for Making Password-Based Key Exchange Resilient to Server CompromiseLecture Notes in Computer Science, 2006
- Secure Computation Without AuthenticationLecture Notes in Computer Science, 2005
- Universally Composable Password-Based Key ExchangeLecture Notes in Computer Science, 2005
- Practical Verifiable Encryption and Decryption of Discrete LogarithmsLecture Notes in Computer Science, 2003
- Universal Composition with Joint StateLecture Notes in Computer Science, 2003
- Cryptographic Protocols Provably Secure Against Dynamic AdversariesPublished by Springer Science and Business Media LLC ,2001
- Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing ErasuresLecture Notes in Computer Science, 2000