scientific article

From MaRDI portal
Revision as of 13:48, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2724585

zbMath0984.94509MaRDI QIDQ2724585

David Pointcheval, Tatsuaki Okamoto

Publication date: 5 May 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (68)

An efficient authenticated key exchange from random self-reducibility on CSIDHTowards post-quantum security for signal's X3DH handshakePerfect forward secure identity-based authenticated key agreement protocol in the escrow modeVersatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)An Efficient and Provably Secure Certificate-Based Encryption SchemeBlake-Wilson, Johnson \& Menezes protocol revisitedEfficient cryptosystems from \(2^k\)-th power residue symbolsStrengthening the security of authenticated key exchange against bad randomnessOn security analysis of an after-the-fact leakage resilient key exchange protocolThe One-More Discrete Logarithm Assumption in the Generic Group ModelMulti-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)Efficient Public-Key Distance Bounding ProtocolNew results and applications for multi-secret sharing schemesSherlock Holmes zero-knowledge protocolsGeneric Constructions of Stateful Public Key Encryption and Their ApplicationsGeneric constructions of identity-based and certificateless kEMsMemory-tight multi-challenge security of public-key encryptionEfficient NIZKs for algebraic setsIdentity-based chameleon hashing and signatures without key exposureSecure multiparty computation from threshold encryption based on class groupsA formal security analysis of the Signal messaging protocolShort undeniable signatures based on group homomorphismsNew technique for chosen-ciphertext security based on non-interactive zero-knowledgeOffline witness encryption with semi-adaptive securitySigncryption Schemes Based on the Diffie–Hellman ProblemApplications of SigncryptionBeyond eCK: perfect forward secrecy under actor compromise and ephemeral-key revealA mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocolsIdentification Schemes from Key Encapsulation MechanismsCertificateless one-pass and two-party authenticated key agreement protocol and its extensionsNew Constructions and Applications of Trapdoor DDH GroupsIdentity-based authenticated key agreement protocol based on Weil pairingCryptanalysis of a communication-efficient three-party password authenticated key exchange protocolIdentification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle AttacksAutomating Computational Proofs for Public-Key-Based Key ExchangeToward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman AssumptionSimulatable certificateless two-party authenticated key agreement protocolComputational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in MPC ProtocolsIdentity-based trapdoor mercurial commitments and applicationsPost-Quantum Forward-Secure Onion RoutingStrongly secure identity-based authenticated key agreement protocols without bilinear pairingsOn the Connection Between Signcryption and One-Pass Key EstablishmentGeneric constructions of integrated PKE and PEKSA Generic Construction for Universally-Convertible Undeniable SignaturesThe Twin Diffie-Hellman Problem and ApplicationsDesigning Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysOn Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption SchemesSeparation Results on the “One-More” Computational ProblemsAn improved identity-based key agreement protocol and its security proofOn the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deploymentsObtaining a secure and efficient key agreement protocol from (H)MQV and NAXOSEverybody's a target: scalability in public-key encryptionTowards Denial-of-Service-Resilient Key Agreement ProtocolsTMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap AssumptionCharacterization of Strongly Secure Authenticated Key Exchanges without NAXOS TechniqueIdentity-Based Deterministic Signature Scheme without Forking-LemmaOn Forward Secrecy in One-Round Key ExchangeComparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman ProtocolsOn the complexity of the discrete logarithm and Diffie-Hellman problemsThe twin Diffie-Hellman problem and applicationsLeaky Random Oracle (Extended Abstract)Certificateless signature and proxy signature schemes from bilinear pairingsQuantifying the security cost of migrating protocols to practiceAnonymous tokens with private metadata bitA classification of computational assumptions in the algebraic group modelA Public-Key Encryption Scheme with Pseudo-random CiphertextsIND-CCA secure encryption based on a Zheng-Seberry schemeTighter proofs for the SIGMA and TLS 1.3 key exchange protocols







This page was built for publication: