1 |
SHIN J S, JO M, HWANG J Y, et al. A verifier-based password-authenticated key exchange using tamper-proof hardware [J]. The Computer Journal, 2021, 64 (8): 1293-1302. 10.1093/comjnl/bxaa178
|
2 |
于金霞,廉欢欢,汤永利,等. 格上基于口令的三方认证密钥交换协议[J]. 通信学报, 2018, 39 (11): 87-97. 10.11959/j.issn.1000-436x.2018237
|
|
YU J X, LIAN H H, TANG Y L, et al. Password-based three-party authenticated key exchange protocol from lattices [J]. Journal on Communications, 2018, 39(11): 87-97. 10.11959/j.issn.1000-436x.2018237
|
3 |
郭渊博, 尹安琪. 基于格的口令认证密钥交换协议综述[J]. 通信学报, 2022, 43(12): 172-187.
|
|
GUO Y B, YIN A Q. Research on password-authenticated key exchange over lattices [J]. Journal on Communications, 2022, 43(12): 172-187.
|
4 |
KEITH M, SHAO B, STEINBART P J. The usability of passphrases for authentication: an empirical field study [J]. International Journal of Human-Computer Studies, 2007, 65(1): 17-28. 10.1016/j.ijhcs.2006.08.005
|
5 |
CHANG C-C, CHANG Y-F. A novel three-party encrypted key exchange protocol [J]. Computer Standards & Interfaces, 2004, 26 (5): 471-476. 10.1016/j.csi.2003.12.001
|
6 |
STEINER M, TSUDIK G, WAIDNER M. Refinement and extension of encrypted key exchange [J]. ACM SIGOPS Operating Systems Review, 1995, 29(3): 22-30. 10.1145/206826.206834
|
7 |
CHANG T-Y, M-S HWANG, YANG W-P. A communication-efficient three-party password authenticated key exchange protocol[J]. Information Sciences, 2011, 181(1): 217-226. 10.1016/j.ins.2010.08.032
|
8 |
ABDALLA M, P-A FOUQUE, POINTCHEVAL D. Password-based authenticated key exchange in the three-party setting [C]// Proceedings of the 8th International Conference on Theory and Practice in Public Key Cryptography. Berlin: Springer, 2005: 65-84. 10.1007/978-3-540-30580-4_6
|
9 |
JIANG S, GONG G. Password based key exchange with mutual authentication [C]// Proceedings of the 11th International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2004: 267-279. 10.1007/978-3-540-30564-4_19
|
10 |
GROCE A, KATZ J. A new framework for efficient password-based authenticated key exchange [C]// Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: ACM, 2010: 516-525. 10.1145/1866307.1866365
|
11 |
叶茂, 胡学先, 刘文芬. 基于格的三方口令认证密钥交换协议[J]. 电子与信息学报, 2013, 35(6): 1376-1381. 10.3724/sp.j.1146.2012.01135
|
|
YE M, HU X X, LIU W F. Password authenticated key exchange protocol in the three party setting based on lattices [J]. Journal of Electronics & Information Technology, 2013, 35(6): 1376-1381. 10.3724/sp.j.1146.2012.01135
|
12 |
XU D, HE D, CHOO K-K R, et al. Provably secure three-party password authenticated key exchange protocol based on ring learning with error [J]. Cryptology ePrint Archive, 2017: 173311.
|
13 |
LIU C, ZHENG Z, JIA K, et al. Provably secure three-party password-based authenticated key exchange from RLWE [C]// Proceedings of the 2019 International Conference on Information Security Practice and Experience. Cham: Springer, 2019: 56-72. 10.1007/978-3-030-34339-2_4
|
14 |
YIN A, GUO Y, SONG Y, et al. Two-round password-based authenticated key exchange from lattices [J]. Wireless Communications and Mobile Computing, 2020, 2020: 8893628. 10.1155/2020/8893628
|
15 |
CHIESA A, MANOHAR P, SPOONER N. Succinct arguments in the quantum random oracle model [C]// Proceedings of the 2019 Theory of Cryptography Conference. Cham: Springer, 2019: 1-29. 10.1007/978-3-030-36033-7_1
|
16 |
PEIKERT C. A decade of lattice cryptography [J]. Foundations and Trends in Theoretical Computer Science, 2016, 10(4): 283-424. 10.1561/0400000074
|
17 |
GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions [C]// Proceedings of the 40th Annual ACM Symposium on Theory of Computing. New York: ACM, 2008: 197-206. 10.1145/1374376.1374407
|
18 |
CRAMER R, SHOUP V. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption [C]// Proceedings of the 2002 International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2002: 45-64. 10.1007/3-540-46035-7_4
|
19 |
KATZ J, VAIKUNTANATHAN V. Smooth projective hashing and password-based authenticated key exchange from lattices [C]// Proceedings of the 2009 International Conference on the Theory and Application of Cryptology and Information Security. Cham: Springer, 2009: 636-652. 10.1007/978-3-642-10366-7_37
|
20 |
BENHAMOUDA F, BLAZY O, DUCAS L, et al. Hash proof systems over lattices revisited [C]// Proceedings of the 2018 IACR International Workshop on Public Key Cryptography. Cham: Springer, 2018: 644-674. 10.1007/978-3-319-76581-5_22
|
21 |
BELLARE M, POINTCHEVAL D, ROGAWAY P. Authenticated key exchange secure against dictionary attacks [C]// Proceedings of the 2000 International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2000: 139-155. 10.1007/3-540-45539-6_11
|
22 |
GUO Y, ZHANG Z, GUO Y. Anonymous authenticated key agreement and group proof protocol for wearable computing [J]. IEEE Transactions on Mobile Computing, 2022, 21(8): 2718-2731. 10.1109/tmc.2020.3048703
|
23 |
ABDALLA M, BENHAMOUDA F, POINTCHEVAL D. Public-key encryption indistinguishable under plaintext-checkable attacks[C]// Proceedings of the 2015 IACR International Workshop on Public Key Cryptography. Berlin: Springer, 2015: 332-352. 10.1007/978-3-662-46447-2_15
|
24 |
REGEV O. On lattices, learning with errors, random linear codes, and cryptography [J]. Journal of the ACM, 2009, 56(6): 34. 10.1145/1568318.1568324
|
25 |
ZHANG J, YU Y. Two-round PAKE from approximate SPH and instantiations from lattices [C]// Proceedings of the 2017 International Conference on the Theory and Application of Cryptology and Information Security. Cham: Springer, 2017: 37-67. 10.1007/978-3-319-70700-6_2
|
26 |
高艺恬,陈立全,屠天扬,等. 基于BRLWE的物联网后量子加密技术研究[J].网络与信息安全学报,2022,8(5):140-149. 10.11959/j.issn.2096-109x.2022024
|
|
GAO Y T, CHEN L Q, TU T Y, et al. Post-quantum encryption technology based on BRLWE for internet of things [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 140-149. 10.11959/j.issn.2096-109x.2022024
|