• Publications
  • Influence
Authenticated Key Exchange Secure against Dictionary Attacks
TLDR
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, off line, all possible passwords. Expand
  • 1,357
  • 143
  • PDF
Relations among Notions of Security for Public-Key Encryption Schemes
TLDR
We compare the relative strengths of popular notions of security for public key encryption schemes under chosen plaintext attack and two kinds of chosen ciphertext attack. Expand
  • 1,107
  • 88
  • PDF
Security Arguments for Digital Signatures and Blind Signatures
TLDR
We study the security of blind signatures, especially for their application in electronic cash systems. Expand
  • 947
  • 86
  • PDF
Security Proofs for Signature Schemes
TLDR
In this paper, we address the question of providing security proofs for signature schemes in the so-called random oracle model [1] where committed values are hashed together with the message. Expand
  • 998
  • 63
  • PDF
Password-Based Authenticated Key Exchange in the Three-Party Setting
TLDR
Password-based authenticated key exchange (PAKE) consists of protocols which are designed to be secure even when the secret key used for authentication is a human-memorable password. Expand
  • 385
  • 57
  • PDF
Key-Privacy in Public-Key Encryption
TLDR
We consider a novel security requirement of encryption schemes that we call "key-privacy" or "anonymity". Expand
  • 415
  • 39
  • PDF
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform
TLDR
This paper presents REACT, a new conversion which applies to any weakly secure cryptosystem, in the random oracle model: it is optimal from both the computational and the security points of view. Expand
  • 256
  • 35
  • PDF
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
TLDR
This paper introduces a novel class of computational problems, the gap problems, which can be considered as a dual to the class of the decision problems. Expand
  • 469
  • 34
  • PDF
Simple Password-Based Encrypted Key Exchange Protocols
TLDR
We present two simple password-based encrypted key exchange protocols based on that of Bellovin and Merritt. Expand
  • 281
  • 30
  • PDF
Short Randomizable Signatures
TLDR
In this paper, we propose a new signature scheme with the same features as CL-signatures but without the linear-size drawback. Expand
  • 126
  • 29
  • PDF