An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2135524): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(6 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: CSI-FiSh / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: HMQV / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: GitHub / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: NAXOS / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-022-09427-1 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4229053317 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Continuous After-the-Fact Leakage-Resilient Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: The double ratchet: security notions, proofs, and modularization for the Signal protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tightly-Secure Authenticated Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Proofs for NMAC and HMAC: Security Without Collision-Resistance / rank
 
Normal rank
Property / cites work
 
Property / cites work: New proofs for NMAC and HMAC: security without collision resistance / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249318 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards Plaintext-Aware Public-Key Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341751 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4365732 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ratcheted encryption and key exchange: the security of messaging / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography - PKC 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: CSI-FiSh: efficient isogeny based signatures through class group computations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key agreement protocols and their security analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4263430 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum security analysis of CSIDH / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards post-quantum security for signal's X3DH handshake / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778861 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409115 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Twin Diffie-Hellman Problem and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: A formal security analysis of the Signal messaging protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Highly efficient key exchange protocols with optimal tightness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical isogeny-based key-exchange with optimal tightness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Composability and On-Line Deniability of Authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short lattice-based one-out-of-many proofs and applications to ring signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-Interactive Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical and tightly-secure digital signatures and authenticated key exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: Limits on the efficiency of (ring) LWE-based non-interactive key exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic authenticated key exchange in the quantum random oracle model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tightly-secure authenticated key exchange, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient ratcheting: almost-optimal guarantees for secure messaging / rank
 
Normal rank
Property / cites work
 
Property / cites work: A unified and composable take on ratcheting / rank
 
Normal rank
Property / cites work
 
Property / cites work: An efficient authenticated key exchange from random self-reducibility on CSIDH / rank
 
Normal rank
Property / cites work
 
Property / cites work: HMQV: A High-Performance Secure Diffie-Hellman Protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: 2-Pass Key Exchange Protocols from CPA-Secure KEM / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stronger Security of Authenticated Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: Raptor: a practical lattice-based (linkable) ring signature / rank
 
Normal rank
Property / cites work
 
Property / cites work: Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Benchmarking Post-quantum Cryptography in TLS / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: He gives C-sieves on the CSIDH / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards bidirectional ratcheted key exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: Forward Secure Non-Interactive Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the cryptographic deniability of the Signal protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Understanding and constructing AKE via double-key key encapsulation mechanism / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-message key exchange with strong security from ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deniable Internet Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: DualRing: generic construction of ring signatures with efficient instantiations / rank
 
Normal rank

Latest revision as of 21:32, 28 July 2024

scientific article
Language Label Description Also known as
English
An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
scientific article

    Statements

    An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    9 May 2022
    0 references
    secure instant messaging protocol
    0 references
    signal protocol
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers