Bellovin S and Merritt M. Encrypted key exchange:password-based protocol secure against dictionary attacks[C].Proceedings of the 1992 Conference IEEE computer societysymp. on Research in security and privacy, Oakland, USA,1992: 72-84.[2]Bellare M, Pointcheval D, and Rogaway P. Authenticated keyexchange secure against dictionary attacks[C]. Proceedings ofEUROCRYPT 2000, Bruges, Belgium, LNCS 1807: 139-155.[3]Abdalla M, Chevassut O, and Pointcheval D. One-timeverifier-based encrypted key exchange[C]. Proceedings ofPKC 2005, Les Diablerets, Switzerland, LNCS 3386: 47-64.[4]Abdalla M and Pointcheval D. Simple password-basedencrypted key exchange protocols[C]. Proceedings ofCT-RSA 2005, San Francisco, USA, LNCS 3376: 191-208.[5]Shao Jun, Cao Zhen fu, and Wang Li cheng. Efficientpassword-based authenticated key exchange without Publicinformation[C]. Proceedings of ESORICS 2007, Dresden,Germany, LNCS 4734: 299-310.[6]Feng Deng guo and Chen Wei dong. Modular approach to thedesign and analysis of password-based security protocols[J].Science in China Series F.2007, 50(3):381-398[7]Katz J, Ostrovsky R, and Yung M. Efficientpassword-authentication key exchange using humanmemorablepasswords[C]. Proceedings of EUROCRYPT 2001,Innsbruck, Austria, LNCS 2045: 475-494.[8]Jiang S Q and Gong G. Password based key exchange withmutual authentication[C]. Proceedings of SAC 2004, Nicosia,Cyprus, LNCS 3357: 267-279.[9]殷胤, 李宝. 标准模型下可证安全的加密密钥协商协议[J].软件学报, 2007, 18(2): 422-429.Yin Yin and Li Bao. Provable secure encrypted key exchangeprotocol under standard model[J]. Journal of Software, 2007,18(2): 422-429.
|