1 resultado para Secret key
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo
Filtro por publicador
- JISC Information Environment Repository (2)
- Repository Napier (1)
- Aberystwyth University Repository - Reino Unido (2)
- Andina Digital - Repositorio UASB-Digital - Universidade Andina Simón Bolívar (1)
- Aquatic Commons (43)
- ARCA - Repositório Institucional da FIOCRUZ (1)
- Archive of European Integration (4)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (3)
- Aston University Research Archive (4)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (1)
- Boston University Digital Common (1)
- Brock University, Canada (9)
- Bulgarian Digital Mathematics Library at IMI-BAS (1)
- Cambridge University Engineering Department Publications Database (48)
- CentAUR: Central Archive University of Reading - UK (51)
- Center for Jewish History Digital Collections (1)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (31)
- Cochin University of Science & Technology (CUSAT), India (9)
- CORA - Cork Open Research Archive - University College Cork - Ireland (4)
- DI-fusion - The institutional repository of Université Libre de Bruxelles (2)
- DigitalCommons@University of Nebraska - Lincoln (1)
- Diposit Digital de la UB - Universidade de Barcelona (1)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (1)
- Duke University (4)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (14)
- FAUBA DIGITAL: Repositorio institucional científico y académico de la Facultad de Agronomia de la Universidad de Buenos Aires (1)
- Gallica, Bibliotheque Numerique - Bibliothèque nationale de France (French National Library) (BnF), France (24)
- Greenwich Academic Literature Archive - UK (6)
- Helda - Digital Repository of University of Helsinki (11)
- Indian Institute of Science - Bangalore - Índia (42)
- Institutional Repository of Leibniz University Hannover (1)
- Instituto Politécnico do Porto, Portugal (2)
- Massachusetts Institute of Technology (3)
- Ministerio de Cultura, Spain (80)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (10)
- Portal de Revistas Científicas Complutenses - Espanha (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (197)
- Queensland University of Technology - ePrints Archive (299)
- ReCiL - Repositório Científico Lusófona - Grupo Lusófona, Portugal (1)
- Repositório Científico da Universidade de Évora - Portugal (2)
- Repositório Institucional da Universidade Tecnológica Federal do Paraná (RIUT) (1)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (6)
- SAPIENTIA - Universidade do Algarve - Portugal (1)
- Savoirs UdeS : plateforme de diffusion de la production intellectuelle de l’Université de Sherbrooke - Canada (1)
- South Carolina State Documents Depository (1)
- Universidad Autónoma de Nuevo León, Mexico (1)
- Universidad de Alicante (2)
- Universidad del Rosario, Colombia (3)
- Universidad Politécnica de Madrid (11)
- Universitat de Girona, Spain (2)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (2)
- Université de Lausanne, Switzerland (5)
- Université de Montréal, Canada (9)
- University of Michigan (1)
- University of Queensland eSpace - Australia (3)
- University of Southampton, United Kingdom (4)
- WestminsterResearch - UK (4)
- Worcester Research and Publications - Worcester Research and Publications - UK (1)
Resumo:
Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang proposed a simple 3PAKE protocol based on elliptic curve cryptography, which is claimed to be secure and to provide superior efficiency when compared with similar-purpose solutions. In this paper, however, we show that the solution is vulnerable to key-compromise impersonation and offline password guessing attacks from system insiders or outsiders, which indicates that the empirical approach used to evaluate the scheme's security is flawed. These results highlight the need of employing provable security approaches when designing and analyzing PAKE schemes. Copyright (c) 2011 John Wiley & Sons, Ltd.