WEKO3
アイテム
Efficient N-Party Password-based Authenticated Key Exchange Protocol
https://ipsj.ixsq.nii.ac.jp/records/44745
https://ipsj.ixsq.nii.ac.jp/records/4474513134933-3ae3-40d1-9842-913551360e5c
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2005 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | SIG Technical Reports(1) | |||||||
---|---|---|---|---|---|---|---|---|
公開日 | 2005-07-22 | |||||||
タイトル | ||||||||
タイトル | Efficient N-Party Password-based Authenticated Key Exchange Protocol | |||||||
タイトル | ||||||||
言語 | en | |||||||
タイトル | Efficient N-Party Password-based Authenticated Key Exchange Protocol | |||||||
言語 | ||||||||
言語 | eng | |||||||
資源タイプ | ||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_18gh | |||||||
資源タイプ | technical report | |||||||
著者所属 | ||||||||
東京大学生産技術研究所 | ||||||||
著者所属 | ||||||||
東京大学生産技術研究所 | ||||||||
著者所属 | ||||||||
東京大学生産技術研究所 | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者名 |
幸星漢
古原和邦
今井, 秀樹
× 幸星漢 古原和邦 今井, 秀樹
|
|||||||
著者名(英) |
SeongHan, SHIN
KazukumiKOBARA
HidekiIMAI
× SeongHan, SHIN KazukumiKOBARA HidekiIMAI
|
|||||||
論文抄録 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | In this paper we propose an efficient N-party password-authenticated key exchange (so-called N-PAKE) protocol after showing the intermediate step. For that. We propose another 3-party PAKE protocol that is a basis of the N-PAKE protocol. The N-PAKE protocol is remarkably efficient rather than the previous works and a per-client computational cost is independent on the group size. Specifically each client involved in the protocol is required only four exponentiations and some negligible operations. | |||||||
論文抄録(英) | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | In this paper, we propose an efficient N-party password-authenticated key exchange (so-called N-PAKE) protocol after showing the intermediate step. For that. We propose another 3-party PAKE protocol that is a basis of the N-PAKE protocol. The N-PAKE protocol is remarkably, efficient rather than the previous works and a per-client computational cost is independent on the group size. Specifically, each client involved in the protocol is required only four exponentiations and some negligible operations. | |||||||
書誌レコードID | ||||||||
収録物識別子タイプ | NCID | |||||||
収録物識別子 | AA11235941 | |||||||
書誌情報 |
情報処理学会研究報告コンピュータセキュリティ(CSEC) 巻 2005, 号 70(2005-CSEC-030), p. 265-271, 発行日 2005-07-22 |
|||||||
Notice | ||||||||
SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc. | ||||||||
出版者 | ||||||||
言語 | ja | |||||||
出版者 | 情報処理学会 |