@techreport{oai:ipsj.ixsq.nii.ac.jp:00044745, author = {幸星漢 and 古原和邦 and 今井, 秀樹 and SeongHan, SHIN and KazukumiKOBARA and HidekiIMAI}, issue = {70(2005-CSEC-030)}, month = {Jul}, note = {In this paper we propose an efficient N-party password-authenticated key exchange (so-called N-PAKE) protocol after showing the intermediate step. For that. We propose another 3-party PAKE protocol that is a basis of the N-PAKE protocol. The N-PAKE protocol is remarkably efficient rather than the previous works and a per-client computational cost is independent on the group size. Specifically each client involved in the protocol is required only four exponentiations and some negligible operations., In this paper, we propose an efficient N-party password-authenticated key exchange (so-called N-PAKE) protocol after showing the intermediate step. For that. We propose another 3-party PAKE protocol that is a basis of the N-PAKE protocol. The N-PAKE protocol is remarkably, efficient rather than the previous works and a per-client computational cost is independent on the group size. Specifically, each client involved in the protocol is required only four exponentiations and some negligible operations.}, title = {Efficient N-Party Password-based Authenticated Key Exchange Protocol}, year = {2005} }