On-line/off-line digital signatures
CRYPTO '89 Proceedings on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Inside SSL: Accelerating Secure Transactions
IT Professional
Improving SSL Handshake Performance via Batching
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Improved Online/Offline Signature Schemes
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Architectural Impact of Secure Socket Layer on Internet Servers
ICCD '00 Proceedings of the 2000 IEEE International Conference on Computer Design: VLSI in Computers & Processors
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
Performance analysis of TLS Web servers
ACM Transactions on Computer Systems (TOCS)
Improving secure server performance by re-balancing SSL/TLS handshakes
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Using client puzzles to protect TLS
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Anatomy and Performance of SSL Processing
ISPASS '05 Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2005
Optimal Online/Offline Signature: How to Sign a Message without Online Computation
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Analysis and Comparison of Several Algorithms in SSL/TLS Handshake Protocol
ITCS '09 Proceedings of the 2009 International Conference on Information Technology and Computer Science - Volume 02
A study of the performance of SSL on PDAs
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Provably secure mobile key exchange: applying the Canetti-Krawczyk approach
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Efficient online/offline identity-based signature for wireless sensor network
International Journal of Information Security
Improved Identity Based Online/Offline Signature Scheme
UIC-ATC '10 Proceedings of the 2010 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing
Securing electronic commerce: reducing the SSL overhead
IEEE Network: The Magazine of Global Internetworking
The impact of TLS on SIP server performance: measurement and modeling
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
Server-side authenticated key-establishment protocols are characterized by placing a heavy workload on the server. We propose LAKE: a new protocol that enables amortizing servers’ workload peaks by moving most of the computational burden to the clients. We provide a formal analysis of the LAKE protocol under the Canetti-Krawczyk model and prove it to be secure. To the best of our knowledge, this is the most computationally efficient authenticated key-establishment ever proposed in the literature.