, AKE authenticated key exchange. 2, 8, 58, vol.85, p.86
, CDH computationnal Diffie-Hellman, vol.10, p.79
, CRS common reference string, vol.18, p.48
, CS commitment scheme, vol.12, p.83
, , vol.10, p.77
, ECC error-correcting code
existencially unforgeable under adaptive chosen message attack. 40 fPAKE fuzzy password authenticated key exchange, vol.48, p.91 ,
, HAKE human authenticated key exchange. x, 4, 11, vol.49, p.91
, HCFF human-compatible function family. x, vol.66, p.87
, IC ideal cipher, vol.10, p.74
, IND-CPA indistinguishability under chosen plaintext attacks, p.15
, liPAKE labeled implicit-only password authenticated key exchange. 5, 22, 23, 39, 42, 48 MDS maximum distance separable, p.40
, PKI public-key infrastructure, vol.2, p.86
, RO random oracle, vol.18, p.48
, RP-CSP random planted constraint satisfiability problem, vol.54, p.56
, RSS robust secret sharing. 3-5, vol.46, pp.38-41
, UC universal composability. ix, vol.3, p.91
Ideal Functionality F H pake for PAKE (recalled from [CHK+05]) ,
Ideal Functionality F pake for PAKE (simplified from F H pake ), p.10 ,
,
,
,
,
,
, with a hash function H : {0, 1} ? ×{0, 1} ? ×G ? {0, 1} ? and a symmetric cipher E : G ? {0, 1} ? , D : {0, 1} * ? G for keys in P
Game G 1 (right), showing a setting where P 1?i is corrupted ,
, The Simulator S for the EKE2 Protocol indistinguishability from F liPAKE, vol.34
,
, A Modified TestPwd Interface to Allow for Different Leakage, p.37
, A First Natural Construction (with code-offset fuzzy sketch and PAKE), p.38
Game G 1 (right), showing a setting where both parties are honest ,
,
, Graph of the sequential oracle calls in the ?-unforgeability experiment, p.51
1 Performance of the Time-Based HAKE ,
SPHF-Friendly Non-interactive Commitments, ASIACRYPT 2013, Part I, vol.8269, pp.214-234, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00915542
Simple Functional Encryption Schemes for Inner Products, PKC 2015 ,
URL : https://hal.archives-ouvertes.fr/hal-01108287
, LNCS. Springer, vol.9020, pp.733-751, 2015.
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework, Tal Malkin, vol.4964, pp.335-351, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00419157
Smooth Projective Hashing for Conditionally Extractable Commitments, LNCS, vol.5677, p.10, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00419145
Simple Password-Based Encrypted Key Exchange Protocols, CT-RSA 2005, vol.3376, p.83, 2005. ,
Towards Human Computable Passwords, ITCS 2017, vol.4266, pp.53-57, 2017. ,
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange, 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp.159-175, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01628797
Secure Computation Without Authentication, CRYPTO 2005. Ed. by Victor Shoup, vol.3621, p.41, 2005. ,
Secure Remote Authentication Using Biometric Data, EUROCRYPT 2005, vol.3494, p.38, 2005. ,
Encrypted Key Exchange: PasswordBased Protocols Secure against Dictionary Attacks, 1992 IEEE Symposium on Security and Privacy, pp.72-84, 1992. ,
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, EUROCRYPT 2000, vol.1807, pp.156-171, 2000. ,
Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm, LNCS, vol.1976, pp.531-545, 2000. ,
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme, Journal of Cryptology, vol.16, issue.3, p.50, 2003. ,
Reusable Cryptographic Fuzzy Extractors, ACM CCS 04, pp.82-91, 2004. ,
Authenticated Key Exchange Secure against Dictionary Attacks, EUROCRYPT 2000, vol.1807, pp.58-60, 2000. ,
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, ACM CCS 93, p.14, 1993. ,
Universally Composable Security: A New Paradigm for Cryptographic Protocols, 42nd FOCS, pp.136-145, 2001. ,
Obtaining Universally Compoable Security: Towards the Bare Bones of Trust (Invited Talk)". In: ASIACRYPT, Kaoru Kurosawa, vol.4833, pp.88-112, 2007. ,
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions, EUROCRYPT 2015, Part II, vol.9057, p.16, 2015. ,
DOI : 10.1007/978-3-662-46803-6_11
URL : https://hal.archives-ouvertes.fr/hal-01413262
Universally Composable Commitments, CRYPTO 2001, vol.2139, p.14, 2001. ,
Universally Composable Password-Based Key Exchange, EUROCRYPT 2005, vol.3494, p.41, 2005. ,
DOI : 10.1007/11426639_24
URL : https://link.springer.com/content/pdf/10.1007%2F11426639_24.pdf
The Random Oracle Model and the Ideal Cipher Model Are Equivalent, 2008. ,
DOI : 10.1007/978-3-540-85174-5_1
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-85174-5_1.pdf
, LNCS. Springer, vol.5157, p.74, 2008.
, LNCS, vol.3494, 2005.
New Directions in Cryptography, IEEE Transactions on Information Theory, vol.22, p.23, 1976. ,
Fuzzy Password-Authenticated Key Exchange ,
URL : https://hal.archives-ouvertes.fr/hal-01903733
, LNCS, vol.10822, pp.393-424, 2018.
Functional Encryption with Oblivious Helper, pp.205-214, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01470375
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, LNCS, vol.3027, pp.523-540, 2004. ,
Indifferentiability of 8-Round Feistel Networks, CRYPTO 2016, Part I, vol.9814, p.74, 2016. ,
Universally Composable Non-Interactive Key Exchange, LNCS, vol.8642, p.42, 2014. ,
Non-interactive and Reusable Universally Composable String Commitments with Adaptive Security, ASIACRYPT 2011, vol.7073, p.14, 2011. ,
On the Complexity of Random Satisfiability Problems with Planted Solutions, ACM STOC, p.47 ,
The equivalence of the random oracle model and the ideal cipher model, revisited, p.74, 2011. ,
Universally Composable Commitments Using Random Oracles, LNCS, vol.2951, pp.58-76, 2004. ,
A Fuzzy Commitment Scheme, ACM CCS 99, vol.40, p.38, 1999. ,
Round-Optimal Password-Based Authenticated Key Exchange, TCC 2011, vol.6597, p.48, 2011. ,
On Sharing Secrets and Reed-Solomon Codes, Communications of the ACM, vol.24, p.18, 1981. ,
, LNCS, vol.1807, 2000.
One-Time-Password-Authenticated Key Exchange, LNCS, vol.6168, p.62, 2010. ,
OCB: A BlockCipher Mode of Operation for Efficient Authenticated Encryption, ACM CCS 01, p.15, 2001. ,
Introduction to coding theory, p.15, 2006. ,
, , vol.75, p.53
A Proposal for an ISO Standard for Public Key Encryption, Cryptology ePrint Archive, p.22, 2001. ,