Perfectly Secure Password Protocols in the Bounded Retrieval Model.
Giovanni Di CrescenzoRichard J. LiptonShabsi WalfishPublished in: TCC (2006)
Keyphrases
- retrieval model
- session key
- authentication protocol
- password authentication
- key agreement protocol
- authenticated key agreement
- user authentication
- cryptographic protocols
- secret key
- security protocols
- document retrieval
- key exchange
- key distribution
- diffie hellman
- language model
- information retrieval systems
- authentication mechanism
- language modeling
- public key
- test collection
- password based authenticated key exchange
- retrieval effectiveness
- vector space model
- information retrieval
- query expansion
- security properties
- retrieval systems
- vector space
- security services
- secure communication
- security analysis
- user queries
- key exchange protocol
- key management
- retrieval framework
- smart card
- group communication
- retrieval functions
- standard model
- relevance feedback
- sentence retrieval
- mutual authentication
- data encryption
- relevant documents
- document collections
- security requirements
- information security
- retrieval process
- query processing