@techreport{oai:ipsj.ixsq.nii.ac.jp:00044745,
 author = {幸星漢 and 古原和邦 and 今井, 秀樹 and SeongHan, SHIN and KazukumiKOBARA and HidekiIMAI},
 issue = {70(2005-CSEC-030)},
 month = {Jul},
 note = {In this paper  we propose an efficient N-party password-authenticated key exchange (so-called N-PAKE) protocol after showing the intermediate step. For that. We propose another 3-party PAKE protocol that is a basis of the N-PAKE protocol. The N-PAKE protocol is remarkably  efficient rather than the previous works and a per-client computational cost is independent on the group size. Specifically  each client involved in the protocol is required only four exponentiations and some negligible operations., In this paper, we propose an efficient N-party password-authenticated key exchange (so-called N-PAKE) protocol after showing the intermediate step. For that. We propose another 3-party PAKE protocol that is a basis of the N-PAKE protocol. The N-PAKE protocol is remarkably, efficient rather than the previous works and a per-client computational cost is independent on the group size. Specifically, each client involved in the protocol is required only four exponentiations and some negligible operations.},
 title = {Efficient N-Party Password-based Authenticated Key Exchange Protocol},
 year = {2005}
}